Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 23:11
Static task
static1
Behavioral task
behavioral1
Sample
2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe
Resource
win7-20241023-en
General
-
Target
2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe
-
Size
96KB
-
MD5
94db6bb5e7fcf3f787783b451cc4e758
-
SHA1
2cc1a4f04f2a834bfd0d7d5e12e5bf8bfbbec968
-
SHA256
2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5
-
SHA512
142aafcd976eeb76021766d69fa63210b4afe402feb41a877939d386025537b9397c2192a0c0869c014b20808388894eb95d0648310243893aa8fb3e89d19b79
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:UGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3008 omsecor.exe 2860 omsecor.exe 664 omsecor.exe 1276 omsecor.exe 1344 omsecor.exe 2264 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2944 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 2944 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 3008 omsecor.exe 2860 omsecor.exe 2860 omsecor.exe 1276 omsecor.exe 1276 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2912 set thread context of 2944 2912 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 30 PID 3008 set thread context of 2860 3008 omsecor.exe 32 PID 664 set thread context of 1276 664 omsecor.exe 36 PID 1344 set thread context of 2264 1344 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2944 2912 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 30 PID 2912 wrote to memory of 2944 2912 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 30 PID 2912 wrote to memory of 2944 2912 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 30 PID 2912 wrote to memory of 2944 2912 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 30 PID 2912 wrote to memory of 2944 2912 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 30 PID 2912 wrote to memory of 2944 2912 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 30 PID 2944 wrote to memory of 3008 2944 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 31 PID 2944 wrote to memory of 3008 2944 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 31 PID 2944 wrote to memory of 3008 2944 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 31 PID 2944 wrote to memory of 3008 2944 2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe 31 PID 3008 wrote to memory of 2860 3008 omsecor.exe 32 PID 3008 wrote to memory of 2860 3008 omsecor.exe 32 PID 3008 wrote to memory of 2860 3008 omsecor.exe 32 PID 3008 wrote to memory of 2860 3008 omsecor.exe 32 PID 3008 wrote to memory of 2860 3008 omsecor.exe 32 PID 3008 wrote to memory of 2860 3008 omsecor.exe 32 PID 2860 wrote to memory of 664 2860 omsecor.exe 35 PID 2860 wrote to memory of 664 2860 omsecor.exe 35 PID 2860 wrote to memory of 664 2860 omsecor.exe 35 PID 2860 wrote to memory of 664 2860 omsecor.exe 35 PID 664 wrote to memory of 1276 664 omsecor.exe 36 PID 664 wrote to memory of 1276 664 omsecor.exe 36 PID 664 wrote to memory of 1276 664 omsecor.exe 36 PID 664 wrote to memory of 1276 664 omsecor.exe 36 PID 664 wrote to memory of 1276 664 omsecor.exe 36 PID 664 wrote to memory of 1276 664 omsecor.exe 36 PID 1276 wrote to memory of 1344 1276 omsecor.exe 37 PID 1276 wrote to memory of 1344 1276 omsecor.exe 37 PID 1276 wrote to memory of 1344 1276 omsecor.exe 37 PID 1276 wrote to memory of 1344 1276 omsecor.exe 37 PID 1344 wrote to memory of 2264 1344 omsecor.exe 38 PID 1344 wrote to memory of 2264 1344 omsecor.exe 38 PID 1344 wrote to memory of 2264 1344 omsecor.exe 38 PID 1344 wrote to memory of 2264 1344 omsecor.exe 38 PID 1344 wrote to memory of 2264 1344 omsecor.exe 38 PID 1344 wrote to memory of 2264 1344 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe"C:\Users\Admin\AppData\Local\Temp\2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exeC:\Users\Admin\AppData\Local\Temp\2f1188d9fd663b3fbc33bda75bca8dacc9f54d1bc70296d7cab00d55391812d5.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f81f04cca62679cee0bd5ecbcb26fbe0
SHA14ef5ff914e5182a00461164f77db69ab8bd50007
SHA256796115881644ae603190528388c8e024052ec2670a94e8fa36dba19b189b4392
SHA512aa78f84fe4a5f45db44687cdc17e08a7973b28f49e6ef1a297a3cc0eb3c6fe7fca503bb0aff6ec0563697c8ae3e4697ea4e66f8362c8ac698dec153185f02715
-
Filesize
96KB
MD5d7dc8bf48ddb323531d87742ca02994b
SHA163025de064d6c4dc7412b1755a737e64a30fd28f
SHA25672301ce9e75bbe4cbe2240f3e2fd6630b95831f33b274cce919df885c0b466dd
SHA512d857804867c5dce1dfce3dae09fffd0e014ae88a3e67401e2df6f9e44c5f9ebc45aeb1c6da761d4c25249ec65111ac0ec8072783cb273cea71651a50f59ab394
-
Filesize
96KB
MD5c81b5c6f8435e3df30860b16a3e0d601
SHA10438bb1ea6e463cdda68101be7cd97cc72fdb169
SHA2569b9f991dc31a86f9f8ebeff302758a6b43b945286ac09f88b367a881f80c6ae8
SHA5126aeebbe22eadd0fa0880753ed8afd9db72f1e9b7d21bc694f060d1c04aa07b29bfbf39cb3b6ca5fbc253c93d855cecf7b06ea463a5784d925148781802c0f3f9