Analysis
-
max time kernel
116s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 01:40
Static task
static1
Behavioral task
behavioral1
Sample
9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe
Resource
win7-20241010-en
General
-
Target
9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe
-
Size
134KB
-
MD5
acd5d87e072e2b397b32af9114ca7e60
-
SHA1
2df8835eb662dfa19af62d7bebfe042ef5e9ff62
-
SHA256
9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780e
-
SHA512
309ee57f5c28455aad2acf00720bbcf9b97947ab0434c18175b8fbd81546e31fcfef29cb7f0ec68947f83fa4b5aa3f5e4748279546a0ed717d92fbaa1bf46d8b
-
SSDEEP
1536:ADfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiH:2iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2824 omsecor.exe 2696 omsecor.exe 2756 omsecor.exe 464 omsecor.exe 1756 omsecor.exe 2516 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2888 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 2888 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 2824 omsecor.exe 2696 omsecor.exe 2696 omsecor.exe 464 omsecor.exe 464 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3064 set thread context of 2888 3064 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 30 PID 2824 set thread context of 2696 2824 omsecor.exe 32 PID 2756 set thread context of 464 2756 omsecor.exe 36 PID 1756 set thread context of 2516 1756 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2888 3064 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 30 PID 3064 wrote to memory of 2888 3064 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 30 PID 3064 wrote to memory of 2888 3064 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 30 PID 3064 wrote to memory of 2888 3064 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 30 PID 3064 wrote to memory of 2888 3064 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 30 PID 3064 wrote to memory of 2888 3064 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 30 PID 2888 wrote to memory of 2824 2888 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 31 PID 2888 wrote to memory of 2824 2888 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 31 PID 2888 wrote to memory of 2824 2888 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 31 PID 2888 wrote to memory of 2824 2888 9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe 31 PID 2824 wrote to memory of 2696 2824 omsecor.exe 32 PID 2824 wrote to memory of 2696 2824 omsecor.exe 32 PID 2824 wrote to memory of 2696 2824 omsecor.exe 32 PID 2824 wrote to memory of 2696 2824 omsecor.exe 32 PID 2824 wrote to memory of 2696 2824 omsecor.exe 32 PID 2824 wrote to memory of 2696 2824 omsecor.exe 32 PID 2696 wrote to memory of 2756 2696 omsecor.exe 35 PID 2696 wrote to memory of 2756 2696 omsecor.exe 35 PID 2696 wrote to memory of 2756 2696 omsecor.exe 35 PID 2696 wrote to memory of 2756 2696 omsecor.exe 35 PID 2756 wrote to memory of 464 2756 omsecor.exe 36 PID 2756 wrote to memory of 464 2756 omsecor.exe 36 PID 2756 wrote to memory of 464 2756 omsecor.exe 36 PID 2756 wrote to memory of 464 2756 omsecor.exe 36 PID 2756 wrote to memory of 464 2756 omsecor.exe 36 PID 2756 wrote to memory of 464 2756 omsecor.exe 36 PID 464 wrote to memory of 1756 464 omsecor.exe 37 PID 464 wrote to memory of 1756 464 omsecor.exe 37 PID 464 wrote to memory of 1756 464 omsecor.exe 37 PID 464 wrote to memory of 1756 464 omsecor.exe 37 PID 1756 wrote to memory of 2516 1756 omsecor.exe 38 PID 1756 wrote to memory of 2516 1756 omsecor.exe 38 PID 1756 wrote to memory of 2516 1756 omsecor.exe 38 PID 1756 wrote to memory of 2516 1756 omsecor.exe 38 PID 1756 wrote to memory of 2516 1756 omsecor.exe 38 PID 1756 wrote to memory of 2516 1756 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe"C:\Users\Admin\AppData\Local\Temp\9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exeC:\Users\Admin\AppData\Local\Temp\9294fb94816f3b110fecfb0f30cada9138fa136ed3c93ef0be5fab11d753780eN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD55ce68c76263d053570d82c464d614efb
SHA1d7eee01a17e897412e626c97cc0c8f5696562cc1
SHA256ad1a630e2f4e71590b2c4a48c3fd03844c9475f8112d0aa2aa7ffca20dd5ac88
SHA51278f3d9a815802f4a602173940dbb237f00870834376c8af5ce180df28f8129fcf6dd447afc6e95a3ade3dffcdfea06cd6ee044048e6207b4f221d4c8d5d799aa
-
Filesize
134KB
MD5531de0a3a03e0863a0f1ba6c9a11465d
SHA1da806fa775ca3479a9ddb34cfe35e82e628b9349
SHA256372301680c59346411a57431c371f42a2db7c548b60314e2c375777e96250816
SHA512277a92e22da2ccad37061fae8c809aa00fb859c10a816465c857dd01a1d470a2a671498f5d5de78365711afd43b33b077c85d23ef6598111ebbf9cf25eefc679
-
Filesize
134KB
MD5103bb021e2b519d0b7d9d83d3eaaa4f4
SHA1037668052a0d9e1bf85693e4951b5628bf782eed
SHA2569e6e764a6c3a2a3d7eb72e27383eaefbabb3d295069665ffad3ea800463d7c50
SHA51295ba231adc1ac6926f2bbe487022a18b99b8c5b527acda159d1d102c5683afc3f6f51bc72dec75e69e8aec0fc266e6c826d02121031921da11e8243f66d5a8de