Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 21:29
Static task
static1
Behavioral task
behavioral1
Sample
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe
Resource
win7-20240729-en
General
-
Target
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe
-
Size
96KB
-
MD5
eca5251ebf7783c89f267764cd2348e7
-
SHA1
be5f03c1242410f989a716e65a131178d7836d6f
-
SHA256
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5
-
SHA512
411c9a41982fafd99dfb882da6ef3f064b7a14235b7376372b55a6ee670984a778a5fdddd8b47a6e1e1cea0e55d76c9431f39af7e4f7ee4be10da5d2c4d9cdf8
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:vGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2804 omsecor.exe 2664 omsecor.exe 1520 omsecor.exe 2264 omsecor.exe 2144 omsecor.exe 2352 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2328 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 2328 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 2804 omsecor.exe 2664 omsecor.exe 2664 omsecor.exe 2264 omsecor.exe 2264 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2084 set thread context of 2328 2084 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 30 PID 2804 set thread context of 2664 2804 omsecor.exe 32 PID 1520 set thread context of 2264 1520 omsecor.exe 35 PID 2144 set thread context of 2352 2144 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2328 2084 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 30 PID 2084 wrote to memory of 2328 2084 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 30 PID 2084 wrote to memory of 2328 2084 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 30 PID 2084 wrote to memory of 2328 2084 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 30 PID 2084 wrote to memory of 2328 2084 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 30 PID 2084 wrote to memory of 2328 2084 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 30 PID 2328 wrote to memory of 2804 2328 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 2328 wrote to memory of 2804 2328 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 2328 wrote to memory of 2804 2328 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 2328 wrote to memory of 2804 2328 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 31 PID 2804 wrote to memory of 2664 2804 omsecor.exe 32 PID 2804 wrote to memory of 2664 2804 omsecor.exe 32 PID 2804 wrote to memory of 2664 2804 omsecor.exe 32 PID 2804 wrote to memory of 2664 2804 omsecor.exe 32 PID 2804 wrote to memory of 2664 2804 omsecor.exe 32 PID 2804 wrote to memory of 2664 2804 omsecor.exe 32 PID 2664 wrote to memory of 1520 2664 omsecor.exe 34 PID 2664 wrote to memory of 1520 2664 omsecor.exe 34 PID 2664 wrote to memory of 1520 2664 omsecor.exe 34 PID 2664 wrote to memory of 1520 2664 omsecor.exe 34 PID 1520 wrote to memory of 2264 1520 omsecor.exe 35 PID 1520 wrote to memory of 2264 1520 omsecor.exe 35 PID 1520 wrote to memory of 2264 1520 omsecor.exe 35 PID 1520 wrote to memory of 2264 1520 omsecor.exe 35 PID 1520 wrote to memory of 2264 1520 omsecor.exe 35 PID 1520 wrote to memory of 2264 1520 omsecor.exe 35 PID 2264 wrote to memory of 2144 2264 omsecor.exe 36 PID 2264 wrote to memory of 2144 2264 omsecor.exe 36 PID 2264 wrote to memory of 2144 2264 omsecor.exe 36 PID 2264 wrote to memory of 2144 2264 omsecor.exe 36 PID 2144 wrote to memory of 2352 2144 omsecor.exe 37 PID 2144 wrote to memory of 2352 2144 omsecor.exe 37 PID 2144 wrote to memory of 2352 2144 omsecor.exe 37 PID 2144 wrote to memory of 2352 2144 omsecor.exe 37 PID 2144 wrote to memory of 2352 2144 omsecor.exe 37 PID 2144 wrote to memory of 2352 2144 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe"C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exeC:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2352
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5184d9d03d9ddf4e34da2ac9f4d4ca4c4
SHA122f58e79cdf45a80b434f4a44027cdc3722b66f8
SHA256a9071f4b2519fc2a6938c9fe3934d52e3e0ddd20faa26d019c0790a7774dc9fa
SHA512c72b7c38fa923316aac91029c95660d4617e40517feca924d2ccbaf086f57318198549588c2a66a1eec7fbefb5ccfff5ffbbee28b264a96ec563d13a3edec7e7
-
Filesize
96KB
MD51015be96f4af5ab58e93cd7fb267df9a
SHA116a31d380f38d6f49e81bad1b11d1b14f4148420
SHA25692118f4c3b9c7e3b0e22b5575441e8db8ddcc2b65f198437eed20044cd050888
SHA5127bbfcf422befb3c5450c46c0534154166d9c2e29bc6a023327aacf6c8ef9daf9e2bf686c29c96eb0c66015da4809a9627b64deb591cc82f1716621f37665a286
-
Filesize
96KB
MD546c8afd853ea821d6b80d539edc024a4
SHA1a5c266f646e46aeebcd8b8ad1cd7f88520a0ce70
SHA25621100d69c4840de0de6d914fdc4fdc85939af76926f94ccfcf64eb1a2bc23ecd
SHA5126eb69e8300b0ca8e57c112729d7d05fbeeae16f1c8bd8de372c75e4d6cadf8b49ce7ba704af0ef7669efe231f6a4e0809183a395ab31eff9ecff426b7c1b7fc4