Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 03:33
Static task
static1
Behavioral task
behavioral1
Sample
1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe
Resource
win7-20240903-en
General
-
Target
1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe
-
Size
96KB
-
MD5
586bb056d66f7795ae2f1abe1b028480
-
SHA1
06364bd0a7b8198e864f7d45ad750789cdb3727b
-
SHA256
1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8e
-
SHA512
da67386310e6059a6dbd68cc1b69bc2bb7c19802c3114e9aba6627f5f8b5b3b9ef569b32de1b1bb7c6a22ba5bcd98f8eed34081e1ef3acd58f9808b40c4cb889
-
SSDEEP
1536:CnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:CGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2816 omsecor.exe 2724 omsecor.exe 592 omsecor.exe 1776 omsecor.exe 2928 omsecor.exe 2396 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1276 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 1276 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 2816 omsecor.exe 2724 omsecor.exe 2724 omsecor.exe 1776 omsecor.exe 1776 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1400 set thread context of 1276 1400 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 31 PID 2816 set thread context of 2724 2816 omsecor.exe 33 PID 592 set thread context of 1776 592 omsecor.exe 37 PID 2928 set thread context of 2396 2928 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1400 wrote to memory of 1276 1400 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 31 PID 1400 wrote to memory of 1276 1400 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 31 PID 1400 wrote to memory of 1276 1400 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 31 PID 1400 wrote to memory of 1276 1400 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 31 PID 1400 wrote to memory of 1276 1400 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 31 PID 1400 wrote to memory of 1276 1400 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 31 PID 1276 wrote to memory of 2816 1276 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 32 PID 1276 wrote to memory of 2816 1276 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 32 PID 1276 wrote to memory of 2816 1276 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 32 PID 1276 wrote to memory of 2816 1276 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 32 PID 2816 wrote to memory of 2724 2816 omsecor.exe 33 PID 2816 wrote to memory of 2724 2816 omsecor.exe 33 PID 2816 wrote to memory of 2724 2816 omsecor.exe 33 PID 2816 wrote to memory of 2724 2816 omsecor.exe 33 PID 2816 wrote to memory of 2724 2816 omsecor.exe 33 PID 2816 wrote to memory of 2724 2816 omsecor.exe 33 PID 2724 wrote to memory of 592 2724 omsecor.exe 36 PID 2724 wrote to memory of 592 2724 omsecor.exe 36 PID 2724 wrote to memory of 592 2724 omsecor.exe 36 PID 2724 wrote to memory of 592 2724 omsecor.exe 36 PID 592 wrote to memory of 1776 592 omsecor.exe 37 PID 592 wrote to memory of 1776 592 omsecor.exe 37 PID 592 wrote to memory of 1776 592 omsecor.exe 37 PID 592 wrote to memory of 1776 592 omsecor.exe 37 PID 592 wrote to memory of 1776 592 omsecor.exe 37 PID 592 wrote to memory of 1776 592 omsecor.exe 37 PID 1776 wrote to memory of 2928 1776 omsecor.exe 38 PID 1776 wrote to memory of 2928 1776 omsecor.exe 38 PID 1776 wrote to memory of 2928 1776 omsecor.exe 38 PID 1776 wrote to memory of 2928 1776 omsecor.exe 38 PID 2928 wrote to memory of 2396 2928 omsecor.exe 39 PID 2928 wrote to memory of 2396 2928 omsecor.exe 39 PID 2928 wrote to memory of 2396 2928 omsecor.exe 39 PID 2928 wrote to memory of 2396 2928 omsecor.exe 39 PID 2928 wrote to memory of 2396 2928 omsecor.exe 39 PID 2928 wrote to memory of 2396 2928 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe"C:\Users\Admin\AppData\Local\Temp\1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exeC:\Users\Admin\AppData\Local\Temp\1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56537e46d8aeb0bbde28256f506da74b3
SHA15d60b643fd69a84cd25e09a4256e99c11c236dd8
SHA256b5196f352ae7bfee29cf2c1adb82a2a0541cd5bdf68eb50698cc91ece2287c48
SHA51217d953c8ce7412790de2731e619a1868a8fb0a480684f7a409d9781941dfa77209459d78e8bbd6b4eef15811174e46fc3cd4e6e440ed97a2d3907f8aaae12ca7
-
Filesize
96KB
MD55c304d8b2a17cb1b63226fef39467e3d
SHA1e278d50e2f5f1488105bfed250e950ee29a16098
SHA256f265eb04159f22029234808a1999d5f90676ac2d6d775bcb37120730d734b831
SHA512ec2ed2d116ad83267e078e71b4cc6119a1562b175cf5140bf684cd2157a7e977933e061b6e4d77698776ff9ebe16d59d2dc2fe4ff394a382df9f2eb6fc91a716
-
Filesize
96KB
MD5af2f390a3f12bd5b587c2284014e0e16
SHA1f07c452766757a6c446655f61f34187e25a37bad
SHA2567ef66f64478ab12d1a1d5193e77297f95376708303481a304b187e2c600a6385
SHA51282e71c98afb294d5ae333b3ff9e72eb20ebfacfdb5b3aab69f19d9e728f9eab67f375f943bed26b6f0b98d2f953ce4e0c3a3c7b88a0c515338657283ff941d72