Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:56
Static task
static1
Behavioral task
behavioral1
Sample
93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe
Resource
win7-20240903-en
General
-
Target
93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe
-
Size
96KB
-
MD5
7cf5710b6312198f6ba4c3c03656deb0
-
SHA1
043d29d59d239d30ddc7573df9bf7ce99d2d3369
-
SHA256
93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19
-
SHA512
77487984acede01d4c3fb74dbcbb097898ed351747c3b5173dbad9f763d7689f8cfed4ace9bd47d00e439325d166f61c032df1f279c5b2e955babd3bccbc6645
-
SSDEEP
1536:KnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:KGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1548 omsecor.exe 2064 omsecor.exe 1956 omsecor.exe 1572 omsecor.exe 1724 omsecor.exe 1704 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1660 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 1660 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 1548 omsecor.exe 2064 omsecor.exe 2064 omsecor.exe 1572 omsecor.exe 1572 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2336 set thread context of 1660 2336 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 30 PID 1548 set thread context of 2064 1548 omsecor.exe 32 PID 1956 set thread context of 1572 1956 omsecor.exe 36 PID 1724 set thread context of 1704 1724 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1660 2336 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 30 PID 2336 wrote to memory of 1660 2336 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 30 PID 2336 wrote to memory of 1660 2336 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 30 PID 2336 wrote to memory of 1660 2336 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 30 PID 2336 wrote to memory of 1660 2336 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 30 PID 2336 wrote to memory of 1660 2336 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 30 PID 1660 wrote to memory of 1548 1660 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 31 PID 1660 wrote to memory of 1548 1660 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 31 PID 1660 wrote to memory of 1548 1660 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 31 PID 1660 wrote to memory of 1548 1660 93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe 31 PID 1548 wrote to memory of 2064 1548 omsecor.exe 32 PID 1548 wrote to memory of 2064 1548 omsecor.exe 32 PID 1548 wrote to memory of 2064 1548 omsecor.exe 32 PID 1548 wrote to memory of 2064 1548 omsecor.exe 32 PID 1548 wrote to memory of 2064 1548 omsecor.exe 32 PID 1548 wrote to memory of 2064 1548 omsecor.exe 32 PID 2064 wrote to memory of 1956 2064 omsecor.exe 35 PID 2064 wrote to memory of 1956 2064 omsecor.exe 35 PID 2064 wrote to memory of 1956 2064 omsecor.exe 35 PID 2064 wrote to memory of 1956 2064 omsecor.exe 35 PID 1956 wrote to memory of 1572 1956 omsecor.exe 36 PID 1956 wrote to memory of 1572 1956 omsecor.exe 36 PID 1956 wrote to memory of 1572 1956 omsecor.exe 36 PID 1956 wrote to memory of 1572 1956 omsecor.exe 36 PID 1956 wrote to memory of 1572 1956 omsecor.exe 36 PID 1956 wrote to memory of 1572 1956 omsecor.exe 36 PID 1572 wrote to memory of 1724 1572 omsecor.exe 37 PID 1572 wrote to memory of 1724 1572 omsecor.exe 37 PID 1572 wrote to memory of 1724 1572 omsecor.exe 37 PID 1572 wrote to memory of 1724 1572 omsecor.exe 37 PID 1724 wrote to memory of 1704 1724 omsecor.exe 38 PID 1724 wrote to memory of 1704 1724 omsecor.exe 38 PID 1724 wrote to memory of 1704 1724 omsecor.exe 38 PID 1724 wrote to memory of 1704 1724 omsecor.exe 38 PID 1724 wrote to memory of 1704 1724 omsecor.exe 38 PID 1724 wrote to memory of 1704 1724 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe"C:\Users\Admin\AppData\Local\Temp\93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exeC:\Users\Admin\AppData\Local\Temp\93e7cc7e87b8f8ea1669d3c349bf5f2a704596aa1694ee24e6b39f01f3168f19N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1704
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57e8ca65ee1b577524e4e09cf5e899864
SHA1c99a59ad46b22b11a55776306a83b790ea0a3adb
SHA256fb630745f04e0e7481e3a695f116d242e3241a7c97cf03388a4c3fba67614f0e
SHA512455f31537f77c1b29367200f4005d4da9c9439efbeb029bb6b554cd784b480490eff9faf0d5e472ac140cce08f9f76109874061f91c8bd241cded94eca538f1f
-
Filesize
96KB
MD5bc26f80bbbc1e4125f022e6bceade6ae
SHA10c62e00b0ac480915faed1d2bceae2a8f52a988f
SHA25632dc5935fcb1314ee38295cf4e68ca82842555e9b5f693461b71140f3c83a7be
SHA5124cfcdb59771d9d4c21fc960b0a2550d201c7a7e456c16d6e5a9e54d6449c7632b8eb6c73865a58ce48e6581e7383dff20860730407c0db981b6cdfaeefca8967
-
Filesize
96KB
MD5220fcd58d212bace0b441e29c632ef42
SHA16c3894b8897da318501a0885cf37644ec7502599
SHA256a6db75469460b4346ea699324ada70d3745b446a1e9110d56820f0153831d1a3
SHA5126ac889e7b91cc25ebac267f4c63f64b5bee66cc65f80dcc1a3371b7017293cd2f793ec2633c71b389085f98aadba03f23c649ee87b72ddb1169ae1a81657c1bd