Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 07:15
Static task
static1
Behavioral task
behavioral1
Sample
b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe
Resource
win7-20240903-en
General
-
Target
b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe
-
Size
96KB
-
MD5
6389bc155ba269a9096dac1d22b6643d
-
SHA1
b7223ece46cc54483d352f48dff04959596cbd9a
-
SHA256
b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188
-
SHA512
ef4e28f551d352944f9481bb53bd543752c199f65fc6b0b2dd0513090023d22fe177dda38a7ee4149fe0f53fbbd835f75e230db510a6a9d57118e9247366afc7
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:TGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2088 omsecor.exe 2360 omsecor.exe 2664 omsecor.exe 1620 omsecor.exe 1288 omsecor.exe 540 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 816 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 816 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 2088 omsecor.exe 2360 omsecor.exe 2360 omsecor.exe 1620 omsecor.exe 1620 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1992 set thread context of 816 1992 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 30 PID 2088 set thread context of 2360 2088 omsecor.exe 32 PID 2664 set thread context of 1620 2664 omsecor.exe 36 PID 1288 set thread context of 540 1288 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1992 wrote to memory of 816 1992 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 30 PID 1992 wrote to memory of 816 1992 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 30 PID 1992 wrote to memory of 816 1992 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 30 PID 1992 wrote to memory of 816 1992 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 30 PID 1992 wrote to memory of 816 1992 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 30 PID 1992 wrote to memory of 816 1992 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 30 PID 816 wrote to memory of 2088 816 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 31 PID 816 wrote to memory of 2088 816 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 31 PID 816 wrote to memory of 2088 816 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 31 PID 816 wrote to memory of 2088 816 b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe 31 PID 2088 wrote to memory of 2360 2088 omsecor.exe 32 PID 2088 wrote to memory of 2360 2088 omsecor.exe 32 PID 2088 wrote to memory of 2360 2088 omsecor.exe 32 PID 2088 wrote to memory of 2360 2088 omsecor.exe 32 PID 2088 wrote to memory of 2360 2088 omsecor.exe 32 PID 2088 wrote to memory of 2360 2088 omsecor.exe 32 PID 2360 wrote to memory of 2664 2360 omsecor.exe 35 PID 2360 wrote to memory of 2664 2360 omsecor.exe 35 PID 2360 wrote to memory of 2664 2360 omsecor.exe 35 PID 2360 wrote to memory of 2664 2360 omsecor.exe 35 PID 2664 wrote to memory of 1620 2664 omsecor.exe 36 PID 2664 wrote to memory of 1620 2664 omsecor.exe 36 PID 2664 wrote to memory of 1620 2664 omsecor.exe 36 PID 2664 wrote to memory of 1620 2664 omsecor.exe 36 PID 2664 wrote to memory of 1620 2664 omsecor.exe 36 PID 2664 wrote to memory of 1620 2664 omsecor.exe 36 PID 1620 wrote to memory of 1288 1620 omsecor.exe 37 PID 1620 wrote to memory of 1288 1620 omsecor.exe 37 PID 1620 wrote to memory of 1288 1620 omsecor.exe 37 PID 1620 wrote to memory of 1288 1620 omsecor.exe 37 PID 1288 wrote to memory of 540 1288 omsecor.exe 38 PID 1288 wrote to memory of 540 1288 omsecor.exe 38 PID 1288 wrote to memory of 540 1288 omsecor.exe 38 PID 1288 wrote to memory of 540 1288 omsecor.exe 38 PID 1288 wrote to memory of 540 1288 omsecor.exe 38 PID 1288 wrote to memory of 540 1288 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe"C:\Users\Admin\AppData\Local\Temp\b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exeC:\Users\Admin\AppData\Local\Temp\b8bd75724e9fb513d307611d68283fac3e402597ecae46726af3aa300aee6188.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD555909657b40da99b0ed528a78b8d8352
SHA1312537908fbb9f7f9ec739bda022dfe6ec8bd5cb
SHA2568fa55f6341c69d7d644d4de2ddf2d98882095a04f71afedf7b2686446ddc0fcb
SHA512bf0b32ffe5ed9d0a10dd55d8f29934bc56ec48c05b7821d6af6441cf99d3811821276d42916dae2fa1d1fa8d95e15563a389923397bcf973107a0e8c0f89e245
-
Filesize
96KB
MD51d2b4e8e080e8f33544f695b4e7841e3
SHA1b4f05175e17a7fb93a3677b31662efb6643ab8c4
SHA2562b00a6765ea31d15c26a558a2f0e9232d8d1aeae84d19de46640b5481c986441
SHA512ecf3cbdfdb064b0fd6220ed39a23c452ebff7dadfac1051e7be40cb3a91caf936627c9707b2386881816753b875fcdfc6238a3b862faaf2d5dc04255d0049a9f
-
Filesize
96KB
MD51b3d370fbed52cea0b43079783f6c28f
SHA15da06f4ae0932a4c8a9e36531cd8c93daa5461f8
SHA2560acbc91f7f066cfb8461790772b8921ad2978e882fd30843c0098a3c2c869aa6
SHA51237a357729909b1da74c108ae8be9def6e8e94755b8b2b90cf552289ed22b811c0af8a6de7dc4c7dc05be581da774eee0cb61a62ca4e452edd317f5e863c87471