Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 21:28
Static task
static1
Behavioral task
behavioral1
Sample
f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe
Resource
win7-20241010-en
General
-
Target
f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe
-
Size
96KB
-
MD5
259ab1d3bccdf0c804bc85e2989abbe8
-
SHA1
675d88b782b4e9239d4a4f6d1173c74ecec23221
-
SHA256
f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc
-
SHA512
06ebf6cf3f8886b1ba8bd91162e7b0c442798fa703ca5a1ad5d40d6d9dae38e43e447387f9251f310502de97466e0c6eb88b3a49fb727fa5c9e5cc4ef7cd2fad
-
SSDEEP
1536:4nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:4Gs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2896 omsecor.exe 2936 omsecor.exe 2596 omsecor.exe 2500 omsecor.exe 1856 omsecor.exe 2672 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2468 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 2468 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 2896 omsecor.exe 2936 omsecor.exe 2936 omsecor.exe 2500 omsecor.exe 2500 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2180 set thread context of 2468 2180 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 30 PID 2896 set thread context of 2936 2896 omsecor.exe 32 PID 2596 set thread context of 2500 2596 omsecor.exe 36 PID 1856 set thread context of 2672 1856 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2468 2180 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 30 PID 2180 wrote to memory of 2468 2180 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 30 PID 2180 wrote to memory of 2468 2180 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 30 PID 2180 wrote to memory of 2468 2180 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 30 PID 2180 wrote to memory of 2468 2180 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 30 PID 2180 wrote to memory of 2468 2180 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 30 PID 2468 wrote to memory of 2896 2468 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 31 PID 2468 wrote to memory of 2896 2468 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 31 PID 2468 wrote to memory of 2896 2468 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 31 PID 2468 wrote to memory of 2896 2468 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 31 PID 2896 wrote to memory of 2936 2896 omsecor.exe 32 PID 2896 wrote to memory of 2936 2896 omsecor.exe 32 PID 2896 wrote to memory of 2936 2896 omsecor.exe 32 PID 2896 wrote to memory of 2936 2896 omsecor.exe 32 PID 2896 wrote to memory of 2936 2896 omsecor.exe 32 PID 2896 wrote to memory of 2936 2896 omsecor.exe 32 PID 2936 wrote to memory of 2596 2936 omsecor.exe 35 PID 2936 wrote to memory of 2596 2936 omsecor.exe 35 PID 2936 wrote to memory of 2596 2936 omsecor.exe 35 PID 2936 wrote to memory of 2596 2936 omsecor.exe 35 PID 2596 wrote to memory of 2500 2596 omsecor.exe 36 PID 2596 wrote to memory of 2500 2596 omsecor.exe 36 PID 2596 wrote to memory of 2500 2596 omsecor.exe 36 PID 2596 wrote to memory of 2500 2596 omsecor.exe 36 PID 2596 wrote to memory of 2500 2596 omsecor.exe 36 PID 2596 wrote to memory of 2500 2596 omsecor.exe 36 PID 2500 wrote to memory of 1856 2500 omsecor.exe 37 PID 2500 wrote to memory of 1856 2500 omsecor.exe 37 PID 2500 wrote to memory of 1856 2500 omsecor.exe 37 PID 2500 wrote to memory of 1856 2500 omsecor.exe 37 PID 1856 wrote to memory of 2672 1856 omsecor.exe 38 PID 1856 wrote to memory of 2672 1856 omsecor.exe 38 PID 1856 wrote to memory of 2672 1856 omsecor.exe 38 PID 1856 wrote to memory of 2672 1856 omsecor.exe 38 PID 1856 wrote to memory of 2672 1856 omsecor.exe 38 PID 1856 wrote to memory of 2672 1856 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe"C:\Users\Admin\AppData\Local\Temp\f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exeC:\Users\Admin\AppData\Local\Temp\f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55b4241b36e7e17dba104731ed4d36b3b
SHA1c9001ea16bec66a1cb6170028b184e64d9bb8985
SHA256f404305a3f6c169aaaef46388d439021004ffecf2351c4c44321db0c677c2ea0
SHA512947910b55bfbd8117d2b6e623b42297172381170e3eb5a023d955ff505778012e71d28b0cffe68b93a6c33931d8857193ae87f5255b671740620ee544740edaf
-
Filesize
96KB
MD576e5a05f2ac863fb4cd2efb54765bd6b
SHA15b77a6cb26404883c4379e7ac6de1d480bd7cbd1
SHA256aa2dd84c1ebb244868a83438683faf20fb55f3db9a0cdc75c2f7f75083883cad
SHA512d67446143dffbd2658f75387d914a5b0c63ca7894dafeff600f971f95c8e64fdb3414f712d5fc9fe57874361b26b6a4a1a3a2345ff796733b005f70503c9a39d
-
Filesize
96KB
MD5e36a07b0c81b8cf92eda5915772baccc
SHA1672d1424ecde918b498f6e638262743aafa503f9
SHA256b680045dc7f75960bff936d412d75557f38b18bed26bc873454853a510ec5656
SHA512583d3d34adbb061e20354dc96abc029e3079eddbada0b816daf178a2fabab25fdc0321d79fd8254d38fb1921276433f9ebd23acd2aac596bfced3c0b5c2243cf