Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 07:20
Static task
static1
Behavioral task
behavioral1
Sample
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe
Resource
win7-20240903-en
General
-
Target
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe
-
Size
96KB
-
MD5
606343d6951c53f2035ed0d62ba8c618
-
SHA1
cd2dd8d2ad3fa6dbf282b61046b4209ee70b8d5f
-
SHA256
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99
-
SHA512
6a06c41361d0c21dc652a0821855c1c45c210078f68ff306e403b56d133b2ff7565c67de78c4f70195adefe26fdc9cbf5df831783766e8b513b5ea33b7cf3478
-
SSDEEP
1536:3nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:3Gs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2380 omsecor.exe 2560 omsecor.exe 1864 omsecor.exe 272 omsecor.exe 3064 omsecor.exe 2492 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1396 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 1396 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 2380 omsecor.exe 2560 omsecor.exe 2560 omsecor.exe 272 omsecor.exe 272 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2300 set thread context of 1396 2300 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 30 PID 2380 set thread context of 2560 2380 omsecor.exe 33 PID 1864 set thread context of 272 1864 omsecor.exe 36 PID 3064 set thread context of 2492 3064 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1396 2300 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 30 PID 2300 wrote to memory of 1396 2300 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 30 PID 2300 wrote to memory of 1396 2300 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 30 PID 2300 wrote to memory of 1396 2300 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 30 PID 2300 wrote to memory of 1396 2300 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 30 PID 2300 wrote to memory of 1396 2300 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 30 PID 1396 wrote to memory of 2380 1396 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 1396 wrote to memory of 2380 1396 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 1396 wrote to memory of 2380 1396 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 1396 wrote to memory of 2380 1396 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 2380 wrote to memory of 2560 2380 omsecor.exe 33 PID 2380 wrote to memory of 2560 2380 omsecor.exe 33 PID 2380 wrote to memory of 2560 2380 omsecor.exe 33 PID 2380 wrote to memory of 2560 2380 omsecor.exe 33 PID 2380 wrote to memory of 2560 2380 omsecor.exe 33 PID 2380 wrote to memory of 2560 2380 omsecor.exe 33 PID 2560 wrote to memory of 1864 2560 omsecor.exe 35 PID 2560 wrote to memory of 1864 2560 omsecor.exe 35 PID 2560 wrote to memory of 1864 2560 omsecor.exe 35 PID 2560 wrote to memory of 1864 2560 omsecor.exe 35 PID 1864 wrote to memory of 272 1864 omsecor.exe 36 PID 1864 wrote to memory of 272 1864 omsecor.exe 36 PID 1864 wrote to memory of 272 1864 omsecor.exe 36 PID 1864 wrote to memory of 272 1864 omsecor.exe 36 PID 1864 wrote to memory of 272 1864 omsecor.exe 36 PID 1864 wrote to memory of 272 1864 omsecor.exe 36 PID 272 wrote to memory of 3064 272 omsecor.exe 37 PID 272 wrote to memory of 3064 272 omsecor.exe 37 PID 272 wrote to memory of 3064 272 omsecor.exe 37 PID 272 wrote to memory of 3064 272 omsecor.exe 37 PID 3064 wrote to memory of 2492 3064 omsecor.exe 38 PID 3064 wrote to memory of 2492 3064 omsecor.exe 38 PID 3064 wrote to memory of 2492 3064 omsecor.exe 38 PID 3064 wrote to memory of 2492 3064 omsecor.exe 38 PID 3064 wrote to memory of 2492 3064 omsecor.exe 38 PID 3064 wrote to memory of 2492 3064 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe"C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exeC:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52f21ddcb3b74b8fef02ab6bcd12a70a7
SHA180e3e6070bd26b46cd745193a67b7bf3f4f5925e
SHA256775d1989558c854244fe8943b6d77122fb51126a2be888a0f920365ad2e6f4d5
SHA51234b806b6fd70b6e4f31a46757c2bbe29528c22f3197217d195cf3ed37b532ad53c3a08269786c3d8deb9bb9a98b0a3975984db1e35cb0296a91f00e7a29f10e1
-
Filesize
96KB
MD590ea0a51ec7efff3c78c3f983607a83d
SHA1e3b0c5a2fd856f7e7bff4c10c29b6024f3b9851d
SHA2563b4584508c76450152f07c764966ff943c0261354ae0d16b1f58387cf2d37f46
SHA51211459b24f1890ef949e6e9307a2b1cecde6e2acbe9600b62d731da2f3ac3b8a5e3efc586032221292565fd38714d6281e14bad0feef332f946e492db99ed56d1
-
Filesize
96KB
MD53d8ccdbe0410d2a37671757093590e21
SHA16f45dce5d44464560451f0bb544a1244c9087dc7
SHA256a01ace678d32d977c2861e23d39e112f87730628a6e432b550df177d0507a9dd
SHA512cf7de9711a472eb62b60a8de0c5072533c3e53d9712e9fbe6cfa63e80ffd22ea374ceaac9178443d8356a2a16cd92cd4e074b4bfb90d341826eb13eac514b1ea