Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 05:30
Static task
static1
Behavioral task
behavioral1
Sample
a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe
Resource
win7-20240729-en
General
-
Target
a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe
-
Size
96KB
-
MD5
7fbb4678106af6e9f226ef321e30c927
-
SHA1
afee6cbc414374c9f09e7e310f63ea85319db6d7
-
SHA256
a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25
-
SHA512
fa954db7ff1371e9887cffa0cea5b8123dd675883e85984177b42285107a0e4f514cb58489fdb574f69d774941e2fb1a7a9ac3db728458db94f8724bca66e29f
-
SSDEEP
1536:tnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:tGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2748 omsecor.exe 2760 omsecor.exe 2588 omsecor.exe 2244 omsecor.exe 236 omsecor.exe 2228 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2900 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 2900 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 2748 omsecor.exe 2760 omsecor.exe 2760 omsecor.exe 2244 omsecor.exe 2244 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2508 set thread context of 2900 2508 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 30 PID 2748 set thread context of 2760 2748 omsecor.exe 32 PID 2588 set thread context of 2244 2588 omsecor.exe 35 PID 236 set thread context of 2228 236 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2900 2508 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 30 PID 2508 wrote to memory of 2900 2508 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 30 PID 2508 wrote to memory of 2900 2508 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 30 PID 2508 wrote to memory of 2900 2508 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 30 PID 2508 wrote to memory of 2900 2508 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 30 PID 2508 wrote to memory of 2900 2508 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 30 PID 2900 wrote to memory of 2748 2900 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 31 PID 2900 wrote to memory of 2748 2900 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 31 PID 2900 wrote to memory of 2748 2900 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 31 PID 2900 wrote to memory of 2748 2900 a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe 31 PID 2748 wrote to memory of 2760 2748 omsecor.exe 32 PID 2748 wrote to memory of 2760 2748 omsecor.exe 32 PID 2748 wrote to memory of 2760 2748 omsecor.exe 32 PID 2748 wrote to memory of 2760 2748 omsecor.exe 32 PID 2748 wrote to memory of 2760 2748 omsecor.exe 32 PID 2748 wrote to memory of 2760 2748 omsecor.exe 32 PID 2760 wrote to memory of 2588 2760 omsecor.exe 34 PID 2760 wrote to memory of 2588 2760 omsecor.exe 34 PID 2760 wrote to memory of 2588 2760 omsecor.exe 34 PID 2760 wrote to memory of 2588 2760 omsecor.exe 34 PID 2588 wrote to memory of 2244 2588 omsecor.exe 35 PID 2588 wrote to memory of 2244 2588 omsecor.exe 35 PID 2588 wrote to memory of 2244 2588 omsecor.exe 35 PID 2588 wrote to memory of 2244 2588 omsecor.exe 35 PID 2588 wrote to memory of 2244 2588 omsecor.exe 35 PID 2588 wrote to memory of 2244 2588 omsecor.exe 35 PID 2244 wrote to memory of 236 2244 omsecor.exe 36 PID 2244 wrote to memory of 236 2244 omsecor.exe 36 PID 2244 wrote to memory of 236 2244 omsecor.exe 36 PID 2244 wrote to memory of 236 2244 omsecor.exe 36 PID 236 wrote to memory of 2228 236 omsecor.exe 37 PID 236 wrote to memory of 2228 236 omsecor.exe 37 PID 236 wrote to memory of 2228 236 omsecor.exe 37 PID 236 wrote to memory of 2228 236 omsecor.exe 37 PID 236 wrote to memory of 2228 236 omsecor.exe 37 PID 236 wrote to memory of 2228 236 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe"C:\Users\Admin\AppData\Local\Temp\a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exeC:\Users\Admin\AppData\Local\Temp\a0a954e78e6b774f13d2a345d76cb2cfacac5168a31c3ee6531494dc72b68c25.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ef51e871c000a88165ec58c4fb452daf
SHA1c560dc7049301c574a060294dabcba523f5cc8c7
SHA256eef9bc076a3f030d29ea29786b414a33e46f033c21629913c8e5d4a073a17579
SHA5126964656cd19dcbdb60b1e7d306d98e29321c0f4630e01267bff8aeb2ec99617ae039030b7e84094b9a9446880de38e8b730f393ce76e105c2cfe55ad82c6729b
-
Filesize
96KB
MD56f205307c235fa2ac71130a5ba8f3e56
SHA160a1101a4b61a83ef4c9e82df74d85bc65775b25
SHA2563a4437b0de0df45508f12c76bfe525b946c66fd68160c9b4a86ca71b805cfece
SHA512254010aaa212c9d80d920ba28ae29500489c161de16012d760a8bc02d37be44822945ef2e4132ee55c848fd7c3d942444457ebbfb74454530005c39147dabd2f
-
Filesize
96KB
MD5f05c9eec48c48ac10be3330d27c28761
SHA124f6bd43b11524482c3ab0cffc9b714143e15645
SHA256971e76513a402c882d6fe3cdaae28279f7d58163538d3ad80af57d5b9ea1c2c0
SHA512a2f3e3b3627dd526a9d9eced6efde7e970f16d4e1accdb6b35dc7e25b20a14977df7bf213b5406d708dd97b4bc9a4c7ceb7b8f0f30c275a277aa4f3b757bf508