Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 07:04
Static task
static1
Behavioral task
behavioral1
Sample
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe
Resource
win7-20240708-en
General
-
Target
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe
-
Size
96KB
-
MD5
606343d6951c53f2035ed0d62ba8c618
-
SHA1
cd2dd8d2ad3fa6dbf282b61046b4209ee70b8d5f
-
SHA256
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99
-
SHA512
6a06c41361d0c21dc652a0821855c1c45c210078f68ff306e403b56d133b2ff7565c67de78c4f70195adefe26fdc9cbf5df831783766e8b513b5ea33b7cf3478
-
SSDEEP
1536:3nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:3Gs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2720 omsecor.exe 2576 omsecor.exe 2900 omsecor.exe 1736 omsecor.exe 2316 omsecor.exe 2244 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2208 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 2208 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 2720 omsecor.exe 2576 omsecor.exe 2576 omsecor.exe 1736 omsecor.exe 1736 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2172 set thread context of 2208 2172 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 2720 set thread context of 2576 2720 omsecor.exe 33 PID 2900 set thread context of 1736 2900 omsecor.exe 36 PID 2316 set thread context of 2244 2316 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2208 2172 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 2172 wrote to memory of 2208 2172 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 2172 wrote to memory of 2208 2172 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 2172 wrote to memory of 2208 2172 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 2172 wrote to memory of 2208 2172 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 2172 wrote to memory of 2208 2172 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 31 PID 2208 wrote to memory of 2720 2208 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 32 PID 2208 wrote to memory of 2720 2208 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 32 PID 2208 wrote to memory of 2720 2208 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 32 PID 2208 wrote to memory of 2720 2208 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 32 PID 2720 wrote to memory of 2576 2720 omsecor.exe 33 PID 2720 wrote to memory of 2576 2720 omsecor.exe 33 PID 2720 wrote to memory of 2576 2720 omsecor.exe 33 PID 2720 wrote to memory of 2576 2720 omsecor.exe 33 PID 2720 wrote to memory of 2576 2720 omsecor.exe 33 PID 2720 wrote to memory of 2576 2720 omsecor.exe 33 PID 2576 wrote to memory of 2900 2576 omsecor.exe 35 PID 2576 wrote to memory of 2900 2576 omsecor.exe 35 PID 2576 wrote to memory of 2900 2576 omsecor.exe 35 PID 2576 wrote to memory of 2900 2576 omsecor.exe 35 PID 2900 wrote to memory of 1736 2900 omsecor.exe 36 PID 2900 wrote to memory of 1736 2900 omsecor.exe 36 PID 2900 wrote to memory of 1736 2900 omsecor.exe 36 PID 2900 wrote to memory of 1736 2900 omsecor.exe 36 PID 2900 wrote to memory of 1736 2900 omsecor.exe 36 PID 2900 wrote to memory of 1736 2900 omsecor.exe 36 PID 1736 wrote to memory of 2316 1736 omsecor.exe 37 PID 1736 wrote to memory of 2316 1736 omsecor.exe 37 PID 1736 wrote to memory of 2316 1736 omsecor.exe 37 PID 1736 wrote to memory of 2316 1736 omsecor.exe 37 PID 2316 wrote to memory of 2244 2316 omsecor.exe 38 PID 2316 wrote to memory of 2244 2316 omsecor.exe 38 PID 2316 wrote to memory of 2244 2316 omsecor.exe 38 PID 2316 wrote to memory of 2244 2316 omsecor.exe 38 PID 2316 wrote to memory of 2244 2316 omsecor.exe 38 PID 2316 wrote to memory of 2244 2316 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe"C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exeC:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a85bc86bd6d5f69db9e933f354b253b2
SHA1191307679bc42b30a4577dd2a246dcc723d082e7
SHA256bf0cf51c27fe85c69ec6f600e62303690cf5495be0aecc963ca872660323bbe5
SHA5125ce37e157f92c26c0967d04f9407fdd9de253eebcedfddc8246e2857a0ba4c7d80022177149a022d96cfea3ec9fced78d01656541f20fadadca4268d0fc61241
-
Filesize
96KB
MD52f21ddcb3b74b8fef02ab6bcd12a70a7
SHA180e3e6070bd26b46cd745193a67b7bf3f4f5925e
SHA256775d1989558c854244fe8943b6d77122fb51126a2be888a0f920365ad2e6f4d5
SHA51234b806b6fd70b6e4f31a46757c2bbe29528c22f3197217d195cf3ed37b532ad53c3a08269786c3d8deb9bb9a98b0a3975984db1e35cb0296a91f00e7a29f10e1
-
Filesize
96KB
MD526682ccde792944963b6139dd7d1067a
SHA1dd64d3ff07d6cbd4cb22648a3003dfa336a569b2
SHA256ac02555bbb480dc55ade80d8d9cbddf47b9b9ba1d46177c4c2c19ba2854da68a
SHA512aab799bc4354aeb16a22171ab5aae25e8fa3464962dc5b121e27110feec447b044b66829fc06ed9a028523f3b056070d6408bb7afc3edbfe34f2c5f70c88b1da