Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 05:42
Static task
static1
Behavioral task
behavioral1
Sample
a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe
Resource
win7-20240903-en
General
-
Target
a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe
-
Size
96KB
-
MD5
5f183655fa1a1055d33053759abd8b05
-
SHA1
4757739dd4a1c5e24981a7742807271ecc23b7a1
-
SHA256
a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2
-
SHA512
5b1d8038890af7fc2500dd5a3ac68b10d09c5f7df687d5458c484a18592abef1ec4961106b3f5098e75359fed25f8b21d5047213cb17d75cf73d6f56ecb1a749
-
SSDEEP
1536:HnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:HGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2344 omsecor.exe 2560 omsecor.exe 2144 omsecor.exe 1784 omsecor.exe 2156 omsecor.exe 2168 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2808 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 2808 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 2344 omsecor.exe 2560 omsecor.exe 2560 omsecor.exe 1784 omsecor.exe 1784 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2736 set thread context of 2808 2736 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 31 PID 2344 set thread context of 2560 2344 omsecor.exe 33 PID 2144 set thread context of 1784 2144 omsecor.exe 36 PID 2156 set thread context of 2168 2156 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2808 2736 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 31 PID 2736 wrote to memory of 2808 2736 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 31 PID 2736 wrote to memory of 2808 2736 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 31 PID 2736 wrote to memory of 2808 2736 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 31 PID 2736 wrote to memory of 2808 2736 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 31 PID 2736 wrote to memory of 2808 2736 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 31 PID 2808 wrote to memory of 2344 2808 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 32 PID 2808 wrote to memory of 2344 2808 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 32 PID 2808 wrote to memory of 2344 2808 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 32 PID 2808 wrote to memory of 2344 2808 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 32 PID 2344 wrote to memory of 2560 2344 omsecor.exe 33 PID 2344 wrote to memory of 2560 2344 omsecor.exe 33 PID 2344 wrote to memory of 2560 2344 omsecor.exe 33 PID 2344 wrote to memory of 2560 2344 omsecor.exe 33 PID 2344 wrote to memory of 2560 2344 omsecor.exe 33 PID 2344 wrote to memory of 2560 2344 omsecor.exe 33 PID 2560 wrote to memory of 2144 2560 omsecor.exe 35 PID 2560 wrote to memory of 2144 2560 omsecor.exe 35 PID 2560 wrote to memory of 2144 2560 omsecor.exe 35 PID 2560 wrote to memory of 2144 2560 omsecor.exe 35 PID 2144 wrote to memory of 1784 2144 omsecor.exe 36 PID 2144 wrote to memory of 1784 2144 omsecor.exe 36 PID 2144 wrote to memory of 1784 2144 omsecor.exe 36 PID 2144 wrote to memory of 1784 2144 omsecor.exe 36 PID 2144 wrote to memory of 1784 2144 omsecor.exe 36 PID 2144 wrote to memory of 1784 2144 omsecor.exe 36 PID 1784 wrote to memory of 2156 1784 omsecor.exe 37 PID 1784 wrote to memory of 2156 1784 omsecor.exe 37 PID 1784 wrote to memory of 2156 1784 omsecor.exe 37 PID 1784 wrote to memory of 2156 1784 omsecor.exe 37 PID 2156 wrote to memory of 2168 2156 omsecor.exe 38 PID 2156 wrote to memory of 2168 2156 omsecor.exe 38 PID 2156 wrote to memory of 2168 2156 omsecor.exe 38 PID 2156 wrote to memory of 2168 2156 omsecor.exe 38 PID 2156 wrote to memory of 2168 2156 omsecor.exe 38 PID 2156 wrote to memory of 2168 2156 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe"C:\Users\Admin\AppData\Local\Temp\a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exeC:\Users\Admin\AppData\Local\Temp\a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e0386cf663208c2c12c41319bcb50cad
SHA1c8e014d136a07f192e2c4649d17c7f72f8daa4ce
SHA256202c13feb011da9688e59c8e4d7024d1678021f245e50123b16bca49c5ec2416
SHA5127857e5344f86b0de96bbf349ee8f0150374804f46457d8024bb5ef7f63885425aad340c69b1bc2e82148232c87ed056b45d24f8931d03c8c030dbb70e58adf63
-
Filesize
96KB
MD5466adf1141531b43662be0dd6ea9682c
SHA1785c9981010a1ccf5de5d64f6c0da40871f619cb
SHA256be2fb5874a40883f83052c9875636903fdc086b7e38e2ae6eb79ba1b37f7b134
SHA5123b9ba1ccc517bd7172179e168e35113d07aec2f75be8b9e78423c3184b1844a66f112c0faa1ee62ae164677ed96d24dc333e308aa71828950441ed6045c0b0db
-
Filesize
96KB
MD54ff62b97aa1a96b9250c4f0dbe8ee857
SHA1cfdac3244b0c324d99ea45cf355aaeef960ee5bc
SHA25628188f10ce0ecf666cfd1ec726d933d83459607bcbaed83ad59510e3a04f60f8
SHA512e08d3e1a4b918f99244df9262711424677577a25bc7bb1bad7181c1189711ecb9ad8f0f17e9ee5818be8aadc9a422d84ea5baddc389d66c00bc1f7b006ddd42c