Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 17:42
Static task
static1
Behavioral task
behavioral1
Sample
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe
Resource
win7-20240903-en
General
-
Target
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe
-
Size
134KB
-
MD5
0a197348ada0a4dbe7930fa2d7661220
-
SHA1
a5422ec34634bffcd6c46770c73015b2fda886dc
-
SHA256
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380
-
SHA512
90fe6f284f79058ffa792217562c2062f5d17dc0fe1543dbfb02c604519e0fa6c9ee0783bdb2b6edf3a21d0aa39ad106a49f8e807a396c9d630b7bc29fc83cb3
-
SSDEEP
1536:GDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCin:4iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2092 omsecor.exe 264 omsecor.exe 1856 omsecor.exe 2500 omsecor.exe 1832 omsecor.exe 2908 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2992 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 2992 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 2092 omsecor.exe 264 omsecor.exe 264 omsecor.exe 2500 omsecor.exe 2500 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2900 set thread context of 2992 2900 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 30 PID 2092 set thread context of 264 2092 omsecor.exe 32 PID 1856 set thread context of 2500 1856 omsecor.exe 36 PID 1832 set thread context of 2908 1832 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2992 2900 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 30 PID 2900 wrote to memory of 2992 2900 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 30 PID 2900 wrote to memory of 2992 2900 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 30 PID 2900 wrote to memory of 2992 2900 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 30 PID 2900 wrote to memory of 2992 2900 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 30 PID 2900 wrote to memory of 2992 2900 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 30 PID 2992 wrote to memory of 2092 2992 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 31 PID 2992 wrote to memory of 2092 2992 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 31 PID 2992 wrote to memory of 2092 2992 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 31 PID 2992 wrote to memory of 2092 2992 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 31 PID 2092 wrote to memory of 264 2092 omsecor.exe 32 PID 2092 wrote to memory of 264 2092 omsecor.exe 32 PID 2092 wrote to memory of 264 2092 omsecor.exe 32 PID 2092 wrote to memory of 264 2092 omsecor.exe 32 PID 2092 wrote to memory of 264 2092 omsecor.exe 32 PID 2092 wrote to memory of 264 2092 omsecor.exe 32 PID 264 wrote to memory of 1856 264 omsecor.exe 35 PID 264 wrote to memory of 1856 264 omsecor.exe 35 PID 264 wrote to memory of 1856 264 omsecor.exe 35 PID 264 wrote to memory of 1856 264 omsecor.exe 35 PID 1856 wrote to memory of 2500 1856 omsecor.exe 36 PID 1856 wrote to memory of 2500 1856 omsecor.exe 36 PID 1856 wrote to memory of 2500 1856 omsecor.exe 36 PID 1856 wrote to memory of 2500 1856 omsecor.exe 36 PID 1856 wrote to memory of 2500 1856 omsecor.exe 36 PID 1856 wrote to memory of 2500 1856 omsecor.exe 36 PID 2500 wrote to memory of 1832 2500 omsecor.exe 37 PID 2500 wrote to memory of 1832 2500 omsecor.exe 37 PID 2500 wrote to memory of 1832 2500 omsecor.exe 37 PID 2500 wrote to memory of 1832 2500 omsecor.exe 37 PID 1832 wrote to memory of 2908 1832 omsecor.exe 38 PID 1832 wrote to memory of 2908 1832 omsecor.exe 38 PID 1832 wrote to memory of 2908 1832 omsecor.exe 38 PID 1832 wrote to memory of 2908 1832 omsecor.exe 38 PID 1832 wrote to memory of 2908 1832 omsecor.exe 38 PID 1832 wrote to memory of 2908 1832 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe"C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exeC:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f576fd85502de24786d9b3f1a1a63cdc
SHA16beb658af70e234e0da9cf772ad12bc5a004545f
SHA256b840c2c6f34a42a274704e9f3dc45574014245206a1462ef0d1e9df9572ae35c
SHA512d80f4f646ea45799dd00749a89344011607795a2d9cc7db3620a5f596fe6419b293465a2ac95c143fbd349abb88c204c47843ec2c330f7a58055d43c561673a2
-
Filesize
134KB
MD535414596d1f915ca0f0f8ccaa1a9429b
SHA17d010efce9080f3a25c6df15167d5360b5dbbcb6
SHA256e31c5b425414540747db8073b025a5d5c1ce71042db27e1bec3b1b520666c2af
SHA512c32d1a7c9bf7b7ee0158dc98f89025b760895771ed75b13ad0c0f5e5b736c01679ca3c5a48ec9b0b57a83cddbdb949bfb485c57a096bced812a8435dbe21206c
-
Filesize
134KB
MD5044fa8eb46da8d8c762b2348bca56901
SHA146c22717f13ed230cf5d93f40a80f03ed75781b7
SHA2561fc8167e48b195fb1ed71270789e6f537ed393b7b9f57acba4559566f3fda6a4
SHA51256609457bde07ce8f48f4d053422d64f91bd2a0f8b2fd2a52ed04b0f1ed2be037de14ed5efeb087d8d9ed0c0b78486375095aa2679272a728543790b266ff3b7