Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 08:04
Static task
static1
Behavioral task
behavioral1
Sample
adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe
Resource
win7-20241010-en
General
-
Target
adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe
-
Size
96KB
-
MD5
e347ccf3742fa70307a7a15f108b0494
-
SHA1
ca8b2f143293076f00a32caf1fa0694e3808c557
-
SHA256
adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968
-
SHA512
cf4a22c0c945d6bc98df0f1b7e89fe8d307c365a8451d78e377bb6e1965c87004af5d491e6189701569ab3323ee5629fb2c50df105ecb4700d264dcd30179d3b
-
SSDEEP
1536:LnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:LGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2228 omsecor.exe 2932 omsecor.exe 700 omsecor.exe 2224 omsecor.exe 3056 omsecor.exe 2532 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2876 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 2876 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 2228 omsecor.exe 2932 omsecor.exe 2932 omsecor.exe 2224 omsecor.exe 2224 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2816 set thread context of 2876 2816 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 30 PID 2228 set thread context of 2932 2228 omsecor.exe 32 PID 700 set thread context of 2224 700 omsecor.exe 36 PID 3056 set thread context of 2532 3056 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2876 2816 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 30 PID 2816 wrote to memory of 2876 2816 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 30 PID 2816 wrote to memory of 2876 2816 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 30 PID 2816 wrote to memory of 2876 2816 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 30 PID 2816 wrote to memory of 2876 2816 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 30 PID 2816 wrote to memory of 2876 2816 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 30 PID 2876 wrote to memory of 2228 2876 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 31 PID 2876 wrote to memory of 2228 2876 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 31 PID 2876 wrote to memory of 2228 2876 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 31 PID 2876 wrote to memory of 2228 2876 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 31 PID 2228 wrote to memory of 2932 2228 omsecor.exe 32 PID 2228 wrote to memory of 2932 2228 omsecor.exe 32 PID 2228 wrote to memory of 2932 2228 omsecor.exe 32 PID 2228 wrote to memory of 2932 2228 omsecor.exe 32 PID 2228 wrote to memory of 2932 2228 omsecor.exe 32 PID 2228 wrote to memory of 2932 2228 omsecor.exe 32 PID 2932 wrote to memory of 700 2932 omsecor.exe 35 PID 2932 wrote to memory of 700 2932 omsecor.exe 35 PID 2932 wrote to memory of 700 2932 omsecor.exe 35 PID 2932 wrote to memory of 700 2932 omsecor.exe 35 PID 700 wrote to memory of 2224 700 omsecor.exe 36 PID 700 wrote to memory of 2224 700 omsecor.exe 36 PID 700 wrote to memory of 2224 700 omsecor.exe 36 PID 700 wrote to memory of 2224 700 omsecor.exe 36 PID 700 wrote to memory of 2224 700 omsecor.exe 36 PID 700 wrote to memory of 2224 700 omsecor.exe 36 PID 2224 wrote to memory of 3056 2224 omsecor.exe 37 PID 2224 wrote to memory of 3056 2224 omsecor.exe 37 PID 2224 wrote to memory of 3056 2224 omsecor.exe 37 PID 2224 wrote to memory of 3056 2224 omsecor.exe 37 PID 3056 wrote to memory of 2532 3056 omsecor.exe 38 PID 3056 wrote to memory of 2532 3056 omsecor.exe 38 PID 3056 wrote to memory of 2532 3056 omsecor.exe 38 PID 3056 wrote to memory of 2532 3056 omsecor.exe 38 PID 3056 wrote to memory of 2532 3056 omsecor.exe 38 PID 3056 wrote to memory of 2532 3056 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe"C:\Users\Admin\AppData\Local\Temp\adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exeC:\Users\Admin\AppData\Local\Temp\adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD543af9b28140a4923d8842b7484765df5
SHA1b25a0340076959c3e80c5a5622e9bd65b9a5f9b8
SHA25659b35b77654625c3a1a0eccdf5c58e439f5637f73ca3a0c9983f75c6cd3ec459
SHA51259e27d52c210c597a2c40e42e926a632cad7ee1b45afe774885cb8f18b40d42fbdbd843e0602e4bd3103c35c9d37244ec1e8d4ffa8ea069901e1952e6face440
-
Filesize
96KB
MD574a459d3f3fa78060a3de38d80f112be
SHA17961690a08ba20d803304a2f54a66b113761e644
SHA256d3828b5a762b97ae600b50396a3f5d6ac477ddfa79fcaea323223c12de546fae
SHA5126507b642b2f61291f026254705791a840458278ef2565f53cf8cef0f5bff0f2b206bb527e42317ad406f12a8c9dcb6f92d46675feaf1a7118e7d0cfd532d076c
-
Filesize
96KB
MD58eab29089eb4c4bd5d0d7cb3a508c9e6
SHA1b89151fef68c6b95129c6420584e154e6d2c650e
SHA2560a1c27f543cbf91dbccd36e037d5b7b282a6a5e662115e655c70ffc238e3bdd5
SHA512f0191b395b2ad5d58a72bcff23205f390d1d39a7a2ab6f759999281b2f39d354dfbd575ad52bdd0d9a83c6e830a7f0ce007f82e5498cdc0d6547687878ba07a1