Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 00:25
Static task
static1
Behavioral task
behavioral1
Sample
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
Resource
win7-20240903-en
General
-
Target
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
-
Size
96KB
-
MD5
58d33f08933a68fe8dfd857b5bd6434f
-
SHA1
601fa23dc75c0299947078f922a0cbe01873c7b8
-
SHA256
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06
-
SHA512
dc84bcbf573b6688593f0de80d606c461aef94d276a1fb50f7c6ce10f6af0a851568798de2e41112988d8d22c255c62b0dfe770a75884d2ca7a61f945ec1fc9e
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx5:EGs8cd8eXlYairZYqMddH135
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2400 omsecor.exe 1976 omsecor.exe 1188 omsecor.exe 536 omsecor.exe 2044 omsecor.exe 2108 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1696 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 1696 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 2400 omsecor.exe 1976 omsecor.exe 1976 omsecor.exe 536 omsecor.exe 536 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2040 set thread context of 1696 2040 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 30 PID 2400 set thread context of 1976 2400 omsecor.exe 32 PID 1188 set thread context of 536 1188 omsecor.exe 36 PID 2044 set thread context of 2108 2044 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1696 2040 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 30 PID 2040 wrote to memory of 1696 2040 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 30 PID 2040 wrote to memory of 1696 2040 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 30 PID 2040 wrote to memory of 1696 2040 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 30 PID 2040 wrote to memory of 1696 2040 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 30 PID 2040 wrote to memory of 1696 2040 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 30 PID 1696 wrote to memory of 2400 1696 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 31 PID 1696 wrote to memory of 2400 1696 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 31 PID 1696 wrote to memory of 2400 1696 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 31 PID 1696 wrote to memory of 2400 1696 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 31 PID 2400 wrote to memory of 1976 2400 omsecor.exe 32 PID 2400 wrote to memory of 1976 2400 omsecor.exe 32 PID 2400 wrote to memory of 1976 2400 omsecor.exe 32 PID 2400 wrote to memory of 1976 2400 omsecor.exe 32 PID 2400 wrote to memory of 1976 2400 omsecor.exe 32 PID 2400 wrote to memory of 1976 2400 omsecor.exe 32 PID 1976 wrote to memory of 1188 1976 omsecor.exe 35 PID 1976 wrote to memory of 1188 1976 omsecor.exe 35 PID 1976 wrote to memory of 1188 1976 omsecor.exe 35 PID 1976 wrote to memory of 1188 1976 omsecor.exe 35 PID 1188 wrote to memory of 536 1188 omsecor.exe 36 PID 1188 wrote to memory of 536 1188 omsecor.exe 36 PID 1188 wrote to memory of 536 1188 omsecor.exe 36 PID 1188 wrote to memory of 536 1188 omsecor.exe 36 PID 1188 wrote to memory of 536 1188 omsecor.exe 36 PID 1188 wrote to memory of 536 1188 omsecor.exe 36 PID 536 wrote to memory of 2044 536 omsecor.exe 37 PID 536 wrote to memory of 2044 536 omsecor.exe 37 PID 536 wrote to memory of 2044 536 omsecor.exe 37 PID 536 wrote to memory of 2044 536 omsecor.exe 37 PID 2044 wrote to memory of 2108 2044 omsecor.exe 38 PID 2044 wrote to memory of 2108 2044 omsecor.exe 38 PID 2044 wrote to memory of 2108 2044 omsecor.exe 38 PID 2044 wrote to memory of 2108 2044 omsecor.exe 38 PID 2044 wrote to memory of 2108 2044 omsecor.exe 38 PID 2044 wrote to memory of 2108 2044 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe"C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exeC:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD504e44493ed919f309eb9765da15b8163
SHA1b3bb70e8bf85255f585a01dba7bc7a317d76307a
SHA2569cad8fca8f3d6992128a01cb84e2a594edf8efc839268cd96b33cd6e1ad2619b
SHA512fb5bc21d84df5926acd40f095bd96959135f182823c579fae06ab0d5ad5b42f8a0eb2f1868c7afb68f8bf014f6b97498ed8c504bbec446644e10c78876169408
-
Filesize
96KB
MD5e6ca0ae1fba14740bf4fafc306b7dd28
SHA16df243043828f58e19aff5f46e3dc3189f040fba
SHA2563f8af113a97f86249f4a0409ab2c0cb21011a8eaf99dabd6c4ea827f4879b80c
SHA5121549fcadaad3acafc3c7cbd633ec65c31cb46dd874655f7790f704da9d2a2671ff29214a3dd1422de1da3cca671ab90c111e228bc2feecffd5213362516b7815
-
Filesize
96KB
MD5640195da4a17af8f0996453d775bdbf2
SHA176157969f8106f90fe45a0a9e5ca0542a24b4207
SHA256fd61f0ba905409c159e37e11ef236584dc2ca9b098482ebdae887c5ef307b383
SHA512a82d74482963c2c25609178019c496646500abaeba1baf43ee726d14e780a131e388f02e097436d59b395afe7f29cff73ed942abf44f30c95b695838f7793305