Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 20:36
Static task
static1
Behavioral task
behavioral1
Sample
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe
Resource
win7-20240708-en
General
-
Target
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe
-
Size
96KB
-
MD5
3076cf51738ce95e89569894b2fc7b40
-
SHA1
7d60990e226390257d7627dc0bb21ae491a21391
-
SHA256
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e
-
SHA512
cc311f8be8e08e1b1fbda869352201283671fedadd89b9fd7b9d3af7591d11d0273a1941793e372b948431f4a8170a687148714f2aee3e17824bfbeffc949d10
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:EGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2808 omsecor.exe 2880 omsecor.exe 1400 omsecor.exe 1440 omsecor.exe 1296 omsecor.exe 1080 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2104 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 2104 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 2808 omsecor.exe 2880 omsecor.exe 2880 omsecor.exe 1440 omsecor.exe 1440 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3020 set thread context of 2104 3020 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 30 PID 2808 set thread context of 2880 2808 omsecor.exe 32 PID 1400 set thread context of 1440 1400 omsecor.exe 35 PID 1296 set thread context of 1080 1296 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2104 3020 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 30 PID 3020 wrote to memory of 2104 3020 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 30 PID 3020 wrote to memory of 2104 3020 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 30 PID 3020 wrote to memory of 2104 3020 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 30 PID 3020 wrote to memory of 2104 3020 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 30 PID 3020 wrote to memory of 2104 3020 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 30 PID 2104 wrote to memory of 2808 2104 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 31 PID 2104 wrote to memory of 2808 2104 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 31 PID 2104 wrote to memory of 2808 2104 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 31 PID 2104 wrote to memory of 2808 2104 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 31 PID 2808 wrote to memory of 2880 2808 omsecor.exe 32 PID 2808 wrote to memory of 2880 2808 omsecor.exe 32 PID 2808 wrote to memory of 2880 2808 omsecor.exe 32 PID 2808 wrote to memory of 2880 2808 omsecor.exe 32 PID 2808 wrote to memory of 2880 2808 omsecor.exe 32 PID 2808 wrote to memory of 2880 2808 omsecor.exe 32 PID 2880 wrote to memory of 1400 2880 omsecor.exe 34 PID 2880 wrote to memory of 1400 2880 omsecor.exe 34 PID 2880 wrote to memory of 1400 2880 omsecor.exe 34 PID 2880 wrote to memory of 1400 2880 omsecor.exe 34 PID 1400 wrote to memory of 1440 1400 omsecor.exe 35 PID 1400 wrote to memory of 1440 1400 omsecor.exe 35 PID 1400 wrote to memory of 1440 1400 omsecor.exe 35 PID 1400 wrote to memory of 1440 1400 omsecor.exe 35 PID 1400 wrote to memory of 1440 1400 omsecor.exe 35 PID 1400 wrote to memory of 1440 1400 omsecor.exe 35 PID 1440 wrote to memory of 1296 1440 omsecor.exe 36 PID 1440 wrote to memory of 1296 1440 omsecor.exe 36 PID 1440 wrote to memory of 1296 1440 omsecor.exe 36 PID 1440 wrote to memory of 1296 1440 omsecor.exe 36 PID 1296 wrote to memory of 1080 1296 omsecor.exe 37 PID 1296 wrote to memory of 1080 1296 omsecor.exe 37 PID 1296 wrote to memory of 1080 1296 omsecor.exe 37 PID 1296 wrote to memory of 1080 1296 omsecor.exe 37 PID 1296 wrote to memory of 1080 1296 omsecor.exe 37 PID 1296 wrote to memory of 1080 1296 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe"C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exeC:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55380557f87dbdce5df6b891ee51953ca
SHA13bf0eb859e6cf123bb090297e8b99fb23580810a
SHA256cab388cb4ff5ea21173816d2f7f694f83137c0b08ffd51dc20bc3b249173bac6
SHA512729c20863b1f4dbdadff127e4706d4785e6ac721f50afeafb91ec14ff15a94430b11e225848c06df8af06253c808178ff56b70ac268cbe28c0b90bbfdce229ea
-
Filesize
96KB
MD5bbb37cc1f96be22adfb9e45fc6661fca
SHA189addd5b6f801187e546067217b0d3ea05f19498
SHA256e57a492783bfa98e1669ac482b3263c03bc97f2ddbb076441e87b8d2758e46b6
SHA5128143bee174191c93168d9c0530dfeb6d04770d543c622dea50c7dbd5b509bf3ba341ba860bc8e2796ac3c4b706427d383d8562ccc6453b28dfcad58c5e7d3acb
-
Filesize
96KB
MD5cf3ac9176a846863b100719567b3ce4f
SHA17237359a6055d1508bdcc2a276b3eff4a88deb08
SHA2565438e14e7a9683949606a6a216bdde0f73e9d1c71c23725db98e4ac5098c67e6
SHA512e0dafd6996d08a57462b511c56ca6bc39394a3d452f4c3c709c571c41168a28c87e973fb80a95710533466acc1528c95ffe68176cf24d5537287a0983fac433e