Analysis
-
max time kernel
116s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 13:50
Static task
static1
Behavioral task
behavioral1
Sample
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe
Resource
win7-20241010-en
General
-
Target
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe
-
Size
134KB
-
MD5
fea7ad8323b536783fd6bb0663652f59
-
SHA1
6bed3ae0094ee8fcdb5ce7efa07e1779cb29f9c0
-
SHA256
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c
-
SHA512
53ab11e1ab5ddec15a48447a85183182e5021078d8f68fec2113f62278ba3e610fd5a415040c094fde1ca1c8f478e7aa53151ec1457035aac31281dcfe0b459b
-
SSDEEP
1536:ADfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi1:2iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2276 omsecor.exe 2960 omsecor.exe 2028 omsecor.exe 2600 omsecor.exe 1396 omsecor.exe 2280 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3064 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 3064 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 2276 omsecor.exe 2960 omsecor.exe 2960 omsecor.exe 2600 omsecor.exe 2600 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2124 set thread context of 3064 2124 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 30 PID 2276 set thread context of 2960 2276 omsecor.exe 32 PID 2028 set thread context of 2600 2028 omsecor.exe 35 PID 1396 set thread context of 2280 1396 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3064 2124 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 30 PID 2124 wrote to memory of 3064 2124 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 30 PID 2124 wrote to memory of 3064 2124 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 30 PID 2124 wrote to memory of 3064 2124 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 30 PID 2124 wrote to memory of 3064 2124 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 30 PID 2124 wrote to memory of 3064 2124 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 30 PID 3064 wrote to memory of 2276 3064 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 31 PID 3064 wrote to memory of 2276 3064 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 31 PID 3064 wrote to memory of 2276 3064 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 31 PID 3064 wrote to memory of 2276 3064 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 31 PID 2276 wrote to memory of 2960 2276 omsecor.exe 32 PID 2276 wrote to memory of 2960 2276 omsecor.exe 32 PID 2276 wrote to memory of 2960 2276 omsecor.exe 32 PID 2276 wrote to memory of 2960 2276 omsecor.exe 32 PID 2276 wrote to memory of 2960 2276 omsecor.exe 32 PID 2276 wrote to memory of 2960 2276 omsecor.exe 32 PID 2960 wrote to memory of 2028 2960 omsecor.exe 34 PID 2960 wrote to memory of 2028 2960 omsecor.exe 34 PID 2960 wrote to memory of 2028 2960 omsecor.exe 34 PID 2960 wrote to memory of 2028 2960 omsecor.exe 34 PID 2028 wrote to memory of 2600 2028 omsecor.exe 35 PID 2028 wrote to memory of 2600 2028 omsecor.exe 35 PID 2028 wrote to memory of 2600 2028 omsecor.exe 35 PID 2028 wrote to memory of 2600 2028 omsecor.exe 35 PID 2028 wrote to memory of 2600 2028 omsecor.exe 35 PID 2028 wrote to memory of 2600 2028 omsecor.exe 35 PID 2600 wrote to memory of 1396 2600 omsecor.exe 36 PID 2600 wrote to memory of 1396 2600 omsecor.exe 36 PID 2600 wrote to memory of 1396 2600 omsecor.exe 36 PID 2600 wrote to memory of 1396 2600 omsecor.exe 36 PID 1396 wrote to memory of 2280 1396 omsecor.exe 37 PID 1396 wrote to memory of 2280 1396 omsecor.exe 37 PID 1396 wrote to memory of 2280 1396 omsecor.exe 37 PID 1396 wrote to memory of 2280 1396 omsecor.exe 37 PID 1396 wrote to memory of 2280 1396 omsecor.exe 37 PID 1396 wrote to memory of 2280 1396 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe"C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exeC:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5c1fe695375d2e048de9f2c2170b0273e
SHA174443b5ab666259067a70bb3a811dd63574a8875
SHA2564aface4922107c79758b239da148407beedfb12280c4a661536a13b462d3ad2c
SHA51268de2172caa59c09e0db3e0e4708a99780ef1ca5ea34e7c5badc746812e6ff29bf1ec06af0c08c8d91e22341f469cca99837bbff519212a0aa4fad07b51b4897
-
Filesize
134KB
MD5e01ba78370c95210ce159b2ad3f1becb
SHA1d9850fdd8303422aef1523a05803dec391f8a570
SHA256e083332ba327f250ed76f8de48444facbb64e97d9a00c52dfbc87c5077cd5420
SHA5123a9f0c235bf9f1050b072bee94043c5410a22fc377b072bbe6e0bf0e1ed78fe8e99430f24b9b39aa732bc4795f14cbdcb9ebd6e84c0a37f0f9f18cded00236b5
-
Filesize
134KB
MD5e40998b8ca1e1de4f3c685223b8f9c72
SHA1c26ca245d2b7251228906a6240259ebbc41c3f3f
SHA25651698083c454fc9282fab2c89369acc5c625095de5b99e45f7b759e7b5126303
SHA5126807782ff03d62e65a860d4310b31c3933f8a246d71b0715c26264478efb978ce3b129b0d02ce9972a11e787845933657b3cf46daa642ea24e1140637098151f