Analysis
-
max time kernel
114s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 14:54
Static task
static1
Behavioral task
behavioral1
Sample
4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe
Resource
win7-20240903-en
General
-
Target
4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe
-
Size
96KB
-
MD5
c3c9082ca4d6f729c7cb85020d976e80
-
SHA1
36850f28b3bf166fcf19d73dcedcfcfff0905f2b
-
SHA256
4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754
-
SHA512
76adb5e809b78b5e027b0bc25e0cb3604d7872d0664b76ec61c93118ec5f43141a708eb7fd9b20272abe3dedbb35f71e55046c5b344377afd9121b41f3bf790d
-
SSDEEP
1536:snAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:sGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2668 omsecor.exe 2704 omsecor.exe 2884 omsecor.exe 2024 omsecor.exe 3036 omsecor.exe 2196 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2776 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 2776 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 2668 omsecor.exe 2704 omsecor.exe 2704 omsecor.exe 2024 omsecor.exe 2024 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2084 set thread context of 2776 2084 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 31 PID 2668 set thread context of 2704 2668 omsecor.exe 33 PID 2884 set thread context of 2024 2884 omsecor.exe 37 PID 3036 set thread context of 2196 3036 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2776 2084 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 31 PID 2084 wrote to memory of 2776 2084 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 31 PID 2084 wrote to memory of 2776 2084 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 31 PID 2084 wrote to memory of 2776 2084 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 31 PID 2084 wrote to memory of 2776 2084 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 31 PID 2084 wrote to memory of 2776 2084 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 31 PID 2776 wrote to memory of 2668 2776 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 32 PID 2776 wrote to memory of 2668 2776 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 32 PID 2776 wrote to memory of 2668 2776 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 32 PID 2776 wrote to memory of 2668 2776 4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe 32 PID 2668 wrote to memory of 2704 2668 omsecor.exe 33 PID 2668 wrote to memory of 2704 2668 omsecor.exe 33 PID 2668 wrote to memory of 2704 2668 omsecor.exe 33 PID 2668 wrote to memory of 2704 2668 omsecor.exe 33 PID 2668 wrote to memory of 2704 2668 omsecor.exe 33 PID 2668 wrote to memory of 2704 2668 omsecor.exe 33 PID 2704 wrote to memory of 2884 2704 omsecor.exe 36 PID 2704 wrote to memory of 2884 2704 omsecor.exe 36 PID 2704 wrote to memory of 2884 2704 omsecor.exe 36 PID 2704 wrote to memory of 2884 2704 omsecor.exe 36 PID 2884 wrote to memory of 2024 2884 omsecor.exe 37 PID 2884 wrote to memory of 2024 2884 omsecor.exe 37 PID 2884 wrote to memory of 2024 2884 omsecor.exe 37 PID 2884 wrote to memory of 2024 2884 omsecor.exe 37 PID 2884 wrote to memory of 2024 2884 omsecor.exe 37 PID 2884 wrote to memory of 2024 2884 omsecor.exe 37 PID 2024 wrote to memory of 3036 2024 omsecor.exe 38 PID 2024 wrote to memory of 3036 2024 omsecor.exe 38 PID 2024 wrote to memory of 3036 2024 omsecor.exe 38 PID 2024 wrote to memory of 3036 2024 omsecor.exe 38 PID 3036 wrote to memory of 2196 3036 omsecor.exe 39 PID 3036 wrote to memory of 2196 3036 omsecor.exe 39 PID 3036 wrote to memory of 2196 3036 omsecor.exe 39 PID 3036 wrote to memory of 2196 3036 omsecor.exe 39 PID 3036 wrote to memory of 2196 3036 omsecor.exe 39 PID 3036 wrote to memory of 2196 3036 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe"C:\Users\Admin\AppData\Local\Temp\4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exeC:\Users\Admin\AppData\Local\Temp\4d9263337fbba1e57004b48e7650ad5c29106ca9b87b92ebc262f5bf6d9dc754N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5064a6a7912924367409b201f465c9254
SHA1286d4e6649476dcd55ebf9c01d668bf34c513ead
SHA2564f30c3a0012ea227c95f296d1246de3c0ffd87bba4df3c7c7bc4023c8820a68e
SHA5121d6650fdc94c418d67b4cf9759b26a72cb53b7ca66d9b9af5f396adcb7ebda8e62ab12135051c142f3a20a49f3ac75661d43ccf505b0b136bb3950b70d97f697
-
Filesize
96KB
MD53276c018a48efa81f995bf038164d115
SHA1b710bfd6c716eeb44745d0b64f8ce59b26966259
SHA256769e6ee6dd99404c5c061bfc828bc842555a4a3b49e87abb41d482c42482d3fe
SHA5121794b814d18089fa2eb60e6c5333b462035b937042873ca01abddfe818d616525f008423e2f0ee9b7e0fbf3e89868a173ca803c059537d9f8f51e3adec3724b3
-
Filesize
96KB
MD5764c02a2c75dec62e1a93cd62600066b
SHA10409fc6672d74f23656175256a3e35e2ddf76af0
SHA2563cb253f3d4a878ece2dad854583465876c35c1df97a109527031dc87140d141a
SHA5122d10b5cbd0874a7a02804ff1eaded3485787e9a93ff1490a442be811d1d65b0d09e70586d56c23c8d531f618c09d833f2ba57778cb1ef5dd7fdff81cd64bf9ff