Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 08:51
Static task
static1
Behavioral task
behavioral1
Sample
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe
Resource
win7-20241023-en
General
-
Target
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe
-
Size
134KB
-
MD5
931ecac4934cf5a1df86431eb9d2fa52
-
SHA1
8aae04793f6d310e3f7187fc82428953767a19b1
-
SHA256
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748
-
SHA512
ee02a0015b832b1de9e073122a240c36be2ea3c5ca18815a317e804d26c0eea25a60ec6599434a95614ccb9f913f772ff44932d251f471e3dcb87c154a37bd66
-
SSDEEP
1536:CDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:0iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2496 omsecor.exe 2620 omsecor.exe 320 omsecor.exe 2664 omsecor.exe 1364 omsecor.exe 2552 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1668 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 1668 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 2496 omsecor.exe 2620 omsecor.exe 2620 omsecor.exe 2664 omsecor.exe 2664 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 848 set thread context of 1668 848 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 30 PID 2496 set thread context of 2620 2496 omsecor.exe 32 PID 320 set thread context of 2664 320 omsecor.exe 36 PID 1364 set thread context of 2552 1364 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 848 wrote to memory of 1668 848 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 30 PID 848 wrote to memory of 1668 848 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 30 PID 848 wrote to memory of 1668 848 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 30 PID 848 wrote to memory of 1668 848 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 30 PID 848 wrote to memory of 1668 848 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 30 PID 848 wrote to memory of 1668 848 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 30 PID 1668 wrote to memory of 2496 1668 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 1668 wrote to memory of 2496 1668 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 1668 wrote to memory of 2496 1668 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 1668 wrote to memory of 2496 1668 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 2496 wrote to memory of 2620 2496 omsecor.exe 32 PID 2496 wrote to memory of 2620 2496 omsecor.exe 32 PID 2496 wrote to memory of 2620 2496 omsecor.exe 32 PID 2496 wrote to memory of 2620 2496 omsecor.exe 32 PID 2496 wrote to memory of 2620 2496 omsecor.exe 32 PID 2496 wrote to memory of 2620 2496 omsecor.exe 32 PID 2620 wrote to memory of 320 2620 omsecor.exe 35 PID 2620 wrote to memory of 320 2620 omsecor.exe 35 PID 2620 wrote to memory of 320 2620 omsecor.exe 35 PID 2620 wrote to memory of 320 2620 omsecor.exe 35 PID 320 wrote to memory of 2664 320 omsecor.exe 36 PID 320 wrote to memory of 2664 320 omsecor.exe 36 PID 320 wrote to memory of 2664 320 omsecor.exe 36 PID 320 wrote to memory of 2664 320 omsecor.exe 36 PID 320 wrote to memory of 2664 320 omsecor.exe 36 PID 320 wrote to memory of 2664 320 omsecor.exe 36 PID 2664 wrote to memory of 1364 2664 omsecor.exe 37 PID 2664 wrote to memory of 1364 2664 omsecor.exe 37 PID 2664 wrote to memory of 1364 2664 omsecor.exe 37 PID 2664 wrote to memory of 1364 2664 omsecor.exe 37 PID 1364 wrote to memory of 2552 1364 omsecor.exe 38 PID 1364 wrote to memory of 2552 1364 omsecor.exe 38 PID 1364 wrote to memory of 2552 1364 omsecor.exe 38 PID 1364 wrote to memory of 2552 1364 omsecor.exe 38 PID 1364 wrote to memory of 2552 1364 omsecor.exe 38 PID 1364 wrote to memory of 2552 1364 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe"C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exeC:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD50e78991117c80a9106ee4b10cf591eef
SHA139990c161fc2c74a341e1138cb403689a010050f
SHA256e8c4ff54bd1b5c1a22e4207bd5d8616ae687867e196df2b94c78a72f43b955e1
SHA5126b1bb17502df791800fb8fca32c1b866fb74c4859c0b290da07f462e63c5a0ae8b648b4e439d49a584e18f561f15d3ca80d53532c4299bae43dc817c94766b29
-
Filesize
134KB
MD52b7ee449e38be11c9c63f9b6bc9d8715
SHA17aa34256b9d1c7f99adbb984a432fa66210a7860
SHA256cdcfc71a5f86afbb47c9de56bf61ad0d8d5d856694aba475e1cc6906c9fb095c
SHA512fb693577a3355d1f91edc36cf5c21ad887e05b749812ad6045223d12c373f4a033d7beda6ea2568fe128762ae223bed54290b566cc1d06946f9f6e35792bab0f
-
Filesize
134KB
MD59dda3b9dc1ac765c28185ae40d057092
SHA13a6431f6ff5ddd28310729ba07586deb59c54917
SHA256dd946dc2156e0897b15761597d87742323a1fee6b8c6523b93ea4cf5af733358
SHA512d57f509b08e6ede61a2a4975fdb1a746ebe0b52285595c326c1c219199d6af8b04ae6f730c2438427cf7b31c285715db9726a2b1e9ca4e1f522bdfde081180c2