Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 21:26
Static task
static1
Behavioral task
behavioral1
Sample
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe
Resource
win7-20240903-en
General
-
Target
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe
-
Size
96KB
-
MD5
eca5251ebf7783c89f267764cd2348e7
-
SHA1
be5f03c1242410f989a716e65a131178d7836d6f
-
SHA256
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5
-
SHA512
411c9a41982fafd99dfb882da6ef3f064b7a14235b7376372b55a6ee670984a778a5fdddd8b47a6e1e1cea0e55d76c9431f39af7e4f7ee4be10da5d2c4d9cdf8
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:vGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2160 omsecor.exe 2944 omsecor.exe 2740 omsecor.exe 2172 omsecor.exe 2228 omsecor.exe 2960 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1364 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 1364 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 2160 omsecor.exe 2944 omsecor.exe 2944 omsecor.exe 2172 omsecor.exe 2172 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 628 set thread context of 1364 628 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 2160 set thread context of 2944 2160 omsecor.exe 33 PID 2740 set thread context of 2172 2740 omsecor.exe 37 PID 2228 set thread context of 2960 2228 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 628 wrote to memory of 1364 628 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 628 wrote to memory of 1364 628 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 628 wrote to memory of 1364 628 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 628 wrote to memory of 1364 628 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 628 wrote to memory of 1364 628 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 628 wrote to memory of 1364 628 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 1364 wrote to memory of 2160 1364 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 32 PID 1364 wrote to memory of 2160 1364 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 32 PID 1364 wrote to memory of 2160 1364 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 32 PID 1364 wrote to memory of 2160 1364 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 32 PID 2160 wrote to memory of 2944 2160 omsecor.exe 33 PID 2160 wrote to memory of 2944 2160 omsecor.exe 33 PID 2160 wrote to memory of 2944 2160 omsecor.exe 33 PID 2160 wrote to memory of 2944 2160 omsecor.exe 33 PID 2160 wrote to memory of 2944 2160 omsecor.exe 33 PID 2160 wrote to memory of 2944 2160 omsecor.exe 33 PID 2944 wrote to memory of 2740 2944 omsecor.exe 36 PID 2944 wrote to memory of 2740 2944 omsecor.exe 36 PID 2944 wrote to memory of 2740 2944 omsecor.exe 36 PID 2944 wrote to memory of 2740 2944 omsecor.exe 36 PID 2740 wrote to memory of 2172 2740 omsecor.exe 37 PID 2740 wrote to memory of 2172 2740 omsecor.exe 37 PID 2740 wrote to memory of 2172 2740 omsecor.exe 37 PID 2740 wrote to memory of 2172 2740 omsecor.exe 37 PID 2740 wrote to memory of 2172 2740 omsecor.exe 37 PID 2740 wrote to memory of 2172 2740 omsecor.exe 37 PID 2172 wrote to memory of 2228 2172 omsecor.exe 38 PID 2172 wrote to memory of 2228 2172 omsecor.exe 38 PID 2172 wrote to memory of 2228 2172 omsecor.exe 38 PID 2172 wrote to memory of 2228 2172 omsecor.exe 38 PID 2228 wrote to memory of 2960 2228 omsecor.exe 39 PID 2228 wrote to memory of 2960 2228 omsecor.exe 39 PID 2228 wrote to memory of 2960 2228 omsecor.exe 39 PID 2228 wrote to memory of 2960 2228 omsecor.exe 39 PID 2228 wrote to memory of 2960 2228 omsecor.exe 39 PID 2228 wrote to memory of 2960 2228 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe"C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exeC:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD51015be96f4af5ab58e93cd7fb267df9a
SHA116a31d380f38d6f49e81bad1b11d1b14f4148420
SHA25692118f4c3b9c7e3b0e22b5575441e8db8ddcc2b65f198437eed20044cd050888
SHA5127bbfcf422befb3c5450c46c0534154166d9c2e29bc6a023327aacf6c8ef9daf9e2bf686c29c96eb0c66015da4809a9627b64deb591cc82f1716621f37665a286
-
Filesize
96KB
MD5fa321284a1a3197c252cc7a0584495cc
SHA11489eb8b204ab2bb599d287c201c275ed1c5ddd6
SHA256479fba31a83a4504fefaeff31874397dc0fcd1694a79737e4e6215bf57535cf8
SHA51241f9614d8d83ecd70f8359d9e5d64bfff5bf25764d7709cb0d0d846c308d9950d2fab4ea2f5096d25193662a52b70cff1fb38c5b976ee6e2234c29733c15e392
-
Filesize
96KB
MD5c7d53fa732311a3ddaee213c4a4f3546
SHA10cd72988d7911497f5f0e0bf101929f07f37cd6f
SHA256676de857312e8e9eea184f341970f5e742d4b125c77ad060530e4827ea827de9
SHA51258f3efd07b27d894ec904dfb04d56006455bb45c2e20b501427c37680c08714dc7411d78868a247b43908f49d31e4b5057b61997b175f1b7185614803b2efca9