Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 10:29
Static task
static1
Behavioral task
behavioral1
Sample
f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe
Resource
win7-20240903-en
General
-
Target
f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe
-
Size
96KB
-
MD5
b31153cf408fccc14297b6f43e514640
-
SHA1
085eeae4d04bf3a083e4984a65dadd732ab5c2a3
-
SHA256
f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87
-
SHA512
0707d619f1bce898564b39c6fcbb9cb544890a27b74f6baff6e9a4d1d6aadfde00f621f09681791039d2a13f337b45a88ec60bbcd6d226f6fb9918b9173e18b2
-
SSDEEP
1536:lnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:lGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2424 omsecor.exe 2384 omsecor.exe 2852 omsecor.exe 1496 omsecor.exe 2096 omsecor.exe 2136 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2064 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 2064 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 2424 omsecor.exe 2384 omsecor.exe 2384 omsecor.exe 1496 omsecor.exe 1496 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2324 set thread context of 2064 2324 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 31 PID 2424 set thread context of 2384 2424 omsecor.exe 33 PID 2852 set thread context of 1496 2852 omsecor.exe 36 PID 2096 set thread context of 2136 2096 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2064 2324 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 31 PID 2324 wrote to memory of 2064 2324 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 31 PID 2324 wrote to memory of 2064 2324 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 31 PID 2324 wrote to memory of 2064 2324 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 31 PID 2324 wrote to memory of 2064 2324 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 31 PID 2324 wrote to memory of 2064 2324 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 31 PID 2064 wrote to memory of 2424 2064 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 32 PID 2064 wrote to memory of 2424 2064 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 32 PID 2064 wrote to memory of 2424 2064 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 32 PID 2064 wrote to memory of 2424 2064 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 32 PID 2424 wrote to memory of 2384 2424 omsecor.exe 33 PID 2424 wrote to memory of 2384 2424 omsecor.exe 33 PID 2424 wrote to memory of 2384 2424 omsecor.exe 33 PID 2424 wrote to memory of 2384 2424 omsecor.exe 33 PID 2424 wrote to memory of 2384 2424 omsecor.exe 33 PID 2424 wrote to memory of 2384 2424 omsecor.exe 33 PID 2384 wrote to memory of 2852 2384 omsecor.exe 35 PID 2384 wrote to memory of 2852 2384 omsecor.exe 35 PID 2384 wrote to memory of 2852 2384 omsecor.exe 35 PID 2384 wrote to memory of 2852 2384 omsecor.exe 35 PID 2852 wrote to memory of 1496 2852 omsecor.exe 36 PID 2852 wrote to memory of 1496 2852 omsecor.exe 36 PID 2852 wrote to memory of 1496 2852 omsecor.exe 36 PID 2852 wrote to memory of 1496 2852 omsecor.exe 36 PID 2852 wrote to memory of 1496 2852 omsecor.exe 36 PID 2852 wrote to memory of 1496 2852 omsecor.exe 36 PID 1496 wrote to memory of 2096 1496 omsecor.exe 37 PID 1496 wrote to memory of 2096 1496 omsecor.exe 37 PID 1496 wrote to memory of 2096 1496 omsecor.exe 37 PID 1496 wrote to memory of 2096 1496 omsecor.exe 37 PID 2096 wrote to memory of 2136 2096 omsecor.exe 38 PID 2096 wrote to memory of 2136 2096 omsecor.exe 38 PID 2096 wrote to memory of 2136 2096 omsecor.exe 38 PID 2096 wrote to memory of 2136 2096 omsecor.exe 38 PID 2096 wrote to memory of 2136 2096 omsecor.exe 38 PID 2096 wrote to memory of 2136 2096 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe"C:\Users\Admin\AppData\Local\Temp\f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exeC:\Users\Admin\AppData\Local\Temp\f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5747e770aa0d155bef88d67b3e6a9782b
SHA185cf8d34488e9611d5b21a4f74074c127e79aa10
SHA2561a5bb84a544f98ce01402ebbd8eb018f4a526bc45899ccc1f18f0023ef1c8342
SHA51282cd2d4faa174f55f9897ddde80b8d29437bc99c219c7f123e40af5c3c4030007f107ef23725b952473c3fd6e50b3d32bc84fe338d459b5b91b56faaeca7fbca
-
Filesize
96KB
MD52b56ab9f7ba4bc1f5d4c634e2712adb4
SHA1261f4dffc03872d454eb824648c5f6c1211e0b07
SHA256e884c372e169c2b955d81ea814386e7a7fa163e846e112cad32e5554221391bd
SHA512973c2da3d4391dd85cc12d7a4a2116f29b93d6db8393ccc8e8a74c89809f6259752a0acd545f7c8628101ab353195392bc3aba78ed3dc379182585e4988b6cc0
-
Filesize
96KB
MD50695aae838fe7fb5fbfa5d3390ff1dec
SHA15a24587fcbd40afbabd87e0e153296c14548e198
SHA2563a79ea43208c60c97d038984480434cabbf058b4157f7b91c2960b8740b971d7
SHA512a4c1d936531a5d672772789dec99ca02b14513b76547991d768cf934c9d8342342bbc697f19318215419b9a8428d46a9561ec8ff20781759ba440f20209599aa