Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 09:05
Static task
static1
Behavioral task
behavioral1
Sample
dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe
Resource
win7-20240708-en
General
-
Target
dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe
-
Size
96KB
-
MD5
6265f95b5751682f1cf51e2acbf42108
-
SHA1
1a92795b59ed886e299a84b5f1c6d179a7f9fda5
-
SHA256
dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7
-
SHA512
4614dc6c42a212b50e3fe839f9fbd2197fe34cb92e1c053506cb7f13087f8c16c35c2a4b1171d9cba76d8d815ed4605076452ae5af01b1c378a62e39e4c15c4b
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:xGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2512 omsecor.exe 2028 omsecor.exe 1668 omsecor.exe 1100 omsecor.exe 1160 omsecor.exe 2876 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2492 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 2492 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 2512 omsecor.exe 2028 omsecor.exe 2028 omsecor.exe 1100 omsecor.exe 1100 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2368 set thread context of 2492 2368 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 30 PID 2512 set thread context of 2028 2512 omsecor.exe 32 PID 1668 set thread context of 1100 1668 omsecor.exe 36 PID 1160 set thread context of 2876 1160 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2492 2368 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 30 PID 2368 wrote to memory of 2492 2368 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 30 PID 2368 wrote to memory of 2492 2368 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 30 PID 2368 wrote to memory of 2492 2368 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 30 PID 2368 wrote to memory of 2492 2368 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 30 PID 2368 wrote to memory of 2492 2368 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 30 PID 2492 wrote to memory of 2512 2492 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 31 PID 2492 wrote to memory of 2512 2492 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 31 PID 2492 wrote to memory of 2512 2492 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 31 PID 2492 wrote to memory of 2512 2492 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 31 PID 2512 wrote to memory of 2028 2512 omsecor.exe 32 PID 2512 wrote to memory of 2028 2512 omsecor.exe 32 PID 2512 wrote to memory of 2028 2512 omsecor.exe 32 PID 2512 wrote to memory of 2028 2512 omsecor.exe 32 PID 2512 wrote to memory of 2028 2512 omsecor.exe 32 PID 2512 wrote to memory of 2028 2512 omsecor.exe 32 PID 2028 wrote to memory of 1668 2028 omsecor.exe 35 PID 2028 wrote to memory of 1668 2028 omsecor.exe 35 PID 2028 wrote to memory of 1668 2028 omsecor.exe 35 PID 2028 wrote to memory of 1668 2028 omsecor.exe 35 PID 1668 wrote to memory of 1100 1668 omsecor.exe 36 PID 1668 wrote to memory of 1100 1668 omsecor.exe 36 PID 1668 wrote to memory of 1100 1668 omsecor.exe 36 PID 1668 wrote to memory of 1100 1668 omsecor.exe 36 PID 1668 wrote to memory of 1100 1668 omsecor.exe 36 PID 1668 wrote to memory of 1100 1668 omsecor.exe 36 PID 1100 wrote to memory of 1160 1100 omsecor.exe 37 PID 1100 wrote to memory of 1160 1100 omsecor.exe 37 PID 1100 wrote to memory of 1160 1100 omsecor.exe 37 PID 1100 wrote to memory of 1160 1100 omsecor.exe 37 PID 1160 wrote to memory of 2876 1160 omsecor.exe 38 PID 1160 wrote to memory of 2876 1160 omsecor.exe 38 PID 1160 wrote to memory of 2876 1160 omsecor.exe 38 PID 1160 wrote to memory of 2876 1160 omsecor.exe 38 PID 1160 wrote to memory of 2876 1160 omsecor.exe 38 PID 1160 wrote to memory of 2876 1160 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe"C:\Users\Admin\AppData\Local\Temp\dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exeC:\Users\Admin\AppData\Local\Temp\dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c7c47a004eb060f5a0cc1fda7b78e9d9
SHA18ff3b25b85402f6c5b7009655419da2615c8ba5c
SHA2566b602921fe6ba928bb6fa63287bf293280a23f637eef3b7da9d1a7d36c59c3cf
SHA512c4232b41e51e1f450ea95fe1f71f902c354f822c68cd695d11505ae5e7be1985084d082b821ec272d86c845e7186b6a984430e47dbde02c12ad066de84707a5f
-
Filesize
96KB
MD5052fc28d269c794f822a8af305de55f5
SHA1eb5e9457e97d40553ab7e6aec0808cb6d33ffa3c
SHA256eee3b6bffe9985ef2040bdc5fcc32a584c0c7f27dfa5ab515a2209199d32d38f
SHA5121032e4330049a6f5e9a6b7db4c0d0852443b4eefbfc3ad0735d1367ceb5cda5fa0fdfd32cfd026776aa6a403421ed83f4e8c289f34be9e4c54a0464eee76444a
-
Filesize
96KB
MD5fa47b0256b57ce95f677be55575d768d
SHA1b49147bfb4d5beed3cd2c76b019dd8e9462b58dc
SHA2569167d90657535a815648ac2a7ca82142c07114ffd974eae140730ffe35c31ef4
SHA5127f137f2f1bb203711eab6f30d354294fa58a4d25bc1fa4befa2d111c6b27ac6367ce6ce3f1f5d5aac178ce11f213dab3fbac1bf2f0cf5156cfcc597af9a82887