Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-01-2025 08:56
Static task
static1
Behavioral task
behavioral1
Sample
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe
Resource
win7-20240903-en
General
-
Target
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe
-
Size
134KB
-
MD5
931ecac4934cf5a1df86431eb9d2fa52
-
SHA1
8aae04793f6d310e3f7187fc82428953767a19b1
-
SHA256
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748
-
SHA512
ee02a0015b832b1de9e073122a240c36be2ea3c5ca18815a317e804d26c0eea25a60ec6599434a95614ccb9f913f772ff44932d251f471e3dcb87c154a37bd66
-
SSDEEP
1536:CDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:0iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3056 omsecor.exe 2208 omsecor.exe 1252 omsecor.exe 1856 omsecor.exe 1404 omsecor.exe 944 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2248 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 2248 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 3056 omsecor.exe 2208 omsecor.exe 2208 omsecor.exe 1856 omsecor.exe 1856 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2484 set thread context of 2248 2484 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 3056 set thread context of 2208 3056 omsecor.exe 33 PID 1252 set thread context of 1856 1252 omsecor.exe 36 PID 1404 set thread context of 944 1404 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2248 2484 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 2484 wrote to memory of 2248 2484 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 2484 wrote to memory of 2248 2484 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 2484 wrote to memory of 2248 2484 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 2484 wrote to memory of 2248 2484 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 2484 wrote to memory of 2248 2484 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 31 PID 2248 wrote to memory of 3056 2248 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 32 PID 2248 wrote to memory of 3056 2248 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 32 PID 2248 wrote to memory of 3056 2248 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 32 PID 2248 wrote to memory of 3056 2248 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 32 PID 3056 wrote to memory of 2208 3056 omsecor.exe 33 PID 3056 wrote to memory of 2208 3056 omsecor.exe 33 PID 3056 wrote to memory of 2208 3056 omsecor.exe 33 PID 3056 wrote to memory of 2208 3056 omsecor.exe 33 PID 3056 wrote to memory of 2208 3056 omsecor.exe 33 PID 3056 wrote to memory of 2208 3056 omsecor.exe 33 PID 2208 wrote to memory of 1252 2208 omsecor.exe 35 PID 2208 wrote to memory of 1252 2208 omsecor.exe 35 PID 2208 wrote to memory of 1252 2208 omsecor.exe 35 PID 2208 wrote to memory of 1252 2208 omsecor.exe 35 PID 1252 wrote to memory of 1856 1252 omsecor.exe 36 PID 1252 wrote to memory of 1856 1252 omsecor.exe 36 PID 1252 wrote to memory of 1856 1252 omsecor.exe 36 PID 1252 wrote to memory of 1856 1252 omsecor.exe 36 PID 1252 wrote to memory of 1856 1252 omsecor.exe 36 PID 1252 wrote to memory of 1856 1252 omsecor.exe 36 PID 1856 wrote to memory of 1404 1856 omsecor.exe 37 PID 1856 wrote to memory of 1404 1856 omsecor.exe 37 PID 1856 wrote to memory of 1404 1856 omsecor.exe 37 PID 1856 wrote to memory of 1404 1856 omsecor.exe 37 PID 1404 wrote to memory of 944 1404 omsecor.exe 38 PID 1404 wrote to memory of 944 1404 omsecor.exe 38 PID 1404 wrote to memory of 944 1404 omsecor.exe 38 PID 1404 wrote to memory of 944 1404 omsecor.exe 38 PID 1404 wrote to memory of 944 1404 omsecor.exe 38 PID 1404 wrote to memory of 944 1404 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe"C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exeC:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:944
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD50e78991117c80a9106ee4b10cf591eef
SHA139990c161fc2c74a341e1138cb403689a010050f
SHA256e8c4ff54bd1b5c1a22e4207bd5d8616ae687867e196df2b94c78a72f43b955e1
SHA5126b1bb17502df791800fb8fca32c1b866fb74c4859c0b290da07f462e63c5a0ae8b648b4e439d49a584e18f561f15d3ca80d53532c4299bae43dc817c94766b29
-
Filesize
134KB
MD59ac8c3bf73025979dadc49f6b6e86dbf
SHA19529cb9c9015c902f16844c0d96e4934fb7f5d50
SHA2561be454b98323d0f3cb15e8455f2c41bcdb906cd436db876fda004353018c5ab5
SHA51221c990fcee660d9a6ff7b568f7eaa932eb8b35c9406332c95006ef03542f03fe0cc2323caf22c250998931155fcc6311399873e6de9e33112ed4d9ed9388f008
-
Filesize
134KB
MD51f4fc456acdc4eca90007ad6a9126cba
SHA1c333d7aa02a365a7f47652e4326494a86c669d8b
SHA256999fed07a443a9d8497f317071042f795247847f062773fadea2944e28ba049e
SHA512f690f16be743c312db7cd2376be3c81efdb37a9ccc4ba93372bbb89ab64c8ec112a2599cb1cee8f695135d26c24f1f0f02dd3be58846758574fdbbdf0103fc9c