Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 14:29
Static task
static1
Behavioral task
behavioral1
Sample
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe
Resource
win7-20240903-en
General
-
Target
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe
-
Size
134KB
-
MD5
f4b1adc0184021c94cf8384a1d29ac30
-
SHA1
092c451b993486aff776c87a6bfaea0249c1f29f
-
SHA256
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3
-
SHA512
5dd1bd77fd58fdaf641f52d0cb9947fccf07a512870381eda0a2a9d96b5951a931ee4e81300e2e3628e24662ca55298b4d71de7f1cc5353fe8f0fd0659d5180d
-
SSDEEP
1536:8DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCif:iiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1920 omsecor.exe 2408 omsecor.exe 1592 omsecor.exe 1200 omsecor.exe 2452 omsecor.exe 1632 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2848 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 2848 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 1920 omsecor.exe 2408 omsecor.exe 2408 omsecor.exe 1200 omsecor.exe 1200 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2868 set thread context of 2848 2868 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 28 PID 1920 set thread context of 2408 1920 omsecor.exe 30 PID 1592 set thread context of 1200 1592 omsecor.exe 35 PID 2452 set thread context of 1632 2452 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2848 2868 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 28 PID 2868 wrote to memory of 2848 2868 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 28 PID 2868 wrote to memory of 2848 2868 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 28 PID 2868 wrote to memory of 2848 2868 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 28 PID 2868 wrote to memory of 2848 2868 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 28 PID 2868 wrote to memory of 2848 2868 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 28 PID 2848 wrote to memory of 1920 2848 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 29 PID 2848 wrote to memory of 1920 2848 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 29 PID 2848 wrote to memory of 1920 2848 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 29 PID 2848 wrote to memory of 1920 2848 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 29 PID 1920 wrote to memory of 2408 1920 omsecor.exe 30 PID 1920 wrote to memory of 2408 1920 omsecor.exe 30 PID 1920 wrote to memory of 2408 1920 omsecor.exe 30 PID 1920 wrote to memory of 2408 1920 omsecor.exe 30 PID 1920 wrote to memory of 2408 1920 omsecor.exe 30 PID 1920 wrote to memory of 2408 1920 omsecor.exe 30 PID 2408 wrote to memory of 1592 2408 omsecor.exe 34 PID 2408 wrote to memory of 1592 2408 omsecor.exe 34 PID 2408 wrote to memory of 1592 2408 omsecor.exe 34 PID 2408 wrote to memory of 1592 2408 omsecor.exe 34 PID 1592 wrote to memory of 1200 1592 omsecor.exe 35 PID 1592 wrote to memory of 1200 1592 omsecor.exe 35 PID 1592 wrote to memory of 1200 1592 omsecor.exe 35 PID 1592 wrote to memory of 1200 1592 omsecor.exe 35 PID 1592 wrote to memory of 1200 1592 omsecor.exe 35 PID 1592 wrote to memory of 1200 1592 omsecor.exe 35 PID 1200 wrote to memory of 2452 1200 omsecor.exe 36 PID 1200 wrote to memory of 2452 1200 omsecor.exe 36 PID 1200 wrote to memory of 2452 1200 omsecor.exe 36 PID 1200 wrote to memory of 2452 1200 omsecor.exe 36 PID 2452 wrote to memory of 1632 2452 omsecor.exe 37 PID 2452 wrote to memory of 1632 2452 omsecor.exe 37 PID 2452 wrote to memory of 1632 2452 omsecor.exe 37 PID 2452 wrote to memory of 1632 2452 omsecor.exe 37 PID 2452 wrote to memory of 1632 2452 omsecor.exe 37 PID 2452 wrote to memory of 1632 2452 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe"C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exeC:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD54d23bb21c3e235a254f682b7eec0504a
SHA1bac0be8afaa16d7c4c716310d745424e9b322aac
SHA256b30ff66298e0363b37a2f53cc0e24e7399ff62d387398cf0a703f859566f3f12
SHA512a00330dce8069c8d23813a2dade77a0cca2ca5eaf9cbfb2651708b5312f5173e275fca26cbc51db3c7fe08cf32e1063f49d2fa16e4ba811ecc4ca930e014382d
-
Filesize
134KB
MD5e731a4406acc52f9fb73561052a92c5f
SHA1986d66f7408dbd70be72087cb2f19eaa5a8f3fbd
SHA256d5935d0042c466641f728086cc516dc93ffc0b6b078accc2e44409969f4f79b5
SHA5125f0500f7e3a25ce9f6e842c09e4391324473911ffa3c4ac81e1522da21356f036b6c2fb845f5d25ec618c87294aa462a246d3874e8c602f46d51d1e8739ebef7
-
Filesize
134KB
MD53ccd6bab1a334a075cb21d3c45d13eff
SHA1b9c7059d99fc2232f9bc0a614e7dba712ab7648b
SHA256beebc51728c4bc6f9969a769c1c6fd124b5d44413acec580cef1368beb7b89c1
SHA512a8626917da79e99349da9bbaf9713bd812e2910a2d6dbd8966fb933cf4d88f2354c1545bd5b72ed54bb28006f6762230e005f3a2bb1afaa36b62a5ab444f8d4f