Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 23:24
Static task
static1
Behavioral task
behavioral1
Sample
ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe
Resource
win7-20240903-en
General
-
Target
ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe
-
Size
96KB
-
MD5
e5cab32bd5eab5060289bc0ea34f735c
-
SHA1
737c299f7b86fd4fbcbd0b5c1046f42ec09607c4
-
SHA256
ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339
-
SHA512
b6097459627e944cd6924ada9e029a34a439c61a3b48678016703dd15c96f243394ab5d3d47c0e3949eb314c70bb2633865c3927e394801d1a727ffab161d328
-
SSDEEP
1536:LnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:LGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2804 omsecor.exe 2488 omsecor.exe 2908 omsecor.exe 1160 omsecor.exe 1756 omsecor.exe 2052 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3068 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 3068 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 2804 omsecor.exe 2488 omsecor.exe 2488 omsecor.exe 1160 omsecor.exe 1160 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2888 set thread context of 3068 2888 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 30 PID 2804 set thread context of 2488 2804 omsecor.exe 32 PID 2908 set thread context of 1160 2908 omsecor.exe 36 PID 1756 set thread context of 2052 1756 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3068 2888 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 30 PID 2888 wrote to memory of 3068 2888 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 30 PID 2888 wrote to memory of 3068 2888 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 30 PID 2888 wrote to memory of 3068 2888 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 30 PID 2888 wrote to memory of 3068 2888 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 30 PID 2888 wrote to memory of 3068 2888 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 30 PID 3068 wrote to memory of 2804 3068 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 31 PID 3068 wrote to memory of 2804 3068 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 31 PID 3068 wrote to memory of 2804 3068 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 31 PID 3068 wrote to memory of 2804 3068 ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe 31 PID 2804 wrote to memory of 2488 2804 omsecor.exe 32 PID 2804 wrote to memory of 2488 2804 omsecor.exe 32 PID 2804 wrote to memory of 2488 2804 omsecor.exe 32 PID 2804 wrote to memory of 2488 2804 omsecor.exe 32 PID 2804 wrote to memory of 2488 2804 omsecor.exe 32 PID 2804 wrote to memory of 2488 2804 omsecor.exe 32 PID 2488 wrote to memory of 2908 2488 omsecor.exe 35 PID 2488 wrote to memory of 2908 2488 omsecor.exe 35 PID 2488 wrote to memory of 2908 2488 omsecor.exe 35 PID 2488 wrote to memory of 2908 2488 omsecor.exe 35 PID 2908 wrote to memory of 1160 2908 omsecor.exe 36 PID 2908 wrote to memory of 1160 2908 omsecor.exe 36 PID 2908 wrote to memory of 1160 2908 omsecor.exe 36 PID 2908 wrote to memory of 1160 2908 omsecor.exe 36 PID 2908 wrote to memory of 1160 2908 omsecor.exe 36 PID 2908 wrote to memory of 1160 2908 omsecor.exe 36 PID 1160 wrote to memory of 1756 1160 omsecor.exe 37 PID 1160 wrote to memory of 1756 1160 omsecor.exe 37 PID 1160 wrote to memory of 1756 1160 omsecor.exe 37 PID 1160 wrote to memory of 1756 1160 omsecor.exe 37 PID 1756 wrote to memory of 2052 1756 omsecor.exe 38 PID 1756 wrote to memory of 2052 1756 omsecor.exe 38 PID 1756 wrote to memory of 2052 1756 omsecor.exe 38 PID 1756 wrote to memory of 2052 1756 omsecor.exe 38 PID 1756 wrote to memory of 2052 1756 omsecor.exe 38 PID 1756 wrote to memory of 2052 1756 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe"C:\Users\Admin\AppData\Local\Temp\ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exeC:\Users\Admin\AppData\Local\Temp\ea84047f7ad04011ee062836ffad1f668051e5644e2103e3bb5e60e2eedbf339.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59ee8b565267a990277bef46a8dc43dd9
SHA108e93fd4cfa911bb196f66b828044a9002d307ae
SHA256231c819c8f69b1ad891c72e62529dff9654c9229ecc9172943a7a885d06a2bc4
SHA512d1736477561bcbad128dda4f14821fbdcde079dce74e5097cf1822aa5676146e78a7abbbbcdfcd8032ba8bb317b9efdd5775f0dcf29e7308ea4d6c8b33f21e3c
-
Filesize
96KB
MD5512d42ee7b4bbd1240b0a0e25fe2d507
SHA15eeff371b17bd8628384656dd9f6b3bfca257887
SHA2563eed6de447d56a2c99c9b9fee59518d8cbf23c255d290c3af6ea50a7bf9a01ea
SHA512908c21fd0c26982a0b9ce8d8d557e247804087715ded4718cbe4fafbe5093c596021b43a6b7c245a1656c395e7606ffaef8cedc11ae845d88f67742977dba3eb
-
Filesize
96KB
MD50e573a834f7ca74a7ef2333edd0443c4
SHA16b0c2364b6546307ac4c834a96ad1df63e202171
SHA2569a2a8a2631eff83c8e0ec96c0bd1355d04266a8e2b81034898aca06a497c7b10
SHA512443aa8f633d56cecc03d25125324feeb4b31b98774e2785acda2afef1bc6765c0873f1bdb8fb1379dfeb5f0014bdaf8e84d0aee3ef5c71bed9a486fc75be2d1d