Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe
Resource
win7-20240903-en
General
-
Target
c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe
-
Size
96KB
-
MD5
727d467bdd8b079da7d3d114a32f64a0
-
SHA1
a7fcc4f0b24e119b9b22817a3ed7ba8d9ec03435
-
SHA256
c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19
-
SHA512
5b2e2a8e613da625a32efd01a5e4c4b7ae014c30bcb4601d84b2d57bfa84dc04c8af08cb6129a5b94876287e242ed178d03619529c35e46b125c6ae9138548ec
-
SSDEEP
1536:tnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:tGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2480 omsecor.exe 2348 omsecor.exe 3004 omsecor.exe 1800 omsecor.exe 1308 omsecor.exe 2084 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1928 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 1928 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 2480 omsecor.exe 2348 omsecor.exe 2348 omsecor.exe 1800 omsecor.exe 1800 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1912 set thread context of 1928 1912 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 30 PID 2480 set thread context of 2348 2480 omsecor.exe 32 PID 3004 set thread context of 1800 3004 omsecor.exe 36 PID 1308 set thread context of 2084 1308 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1928 1912 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 30 PID 1912 wrote to memory of 1928 1912 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 30 PID 1912 wrote to memory of 1928 1912 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 30 PID 1912 wrote to memory of 1928 1912 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 30 PID 1912 wrote to memory of 1928 1912 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 30 PID 1912 wrote to memory of 1928 1912 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 30 PID 1928 wrote to memory of 2480 1928 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 31 PID 1928 wrote to memory of 2480 1928 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 31 PID 1928 wrote to memory of 2480 1928 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 31 PID 1928 wrote to memory of 2480 1928 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 31 PID 2480 wrote to memory of 2348 2480 omsecor.exe 32 PID 2480 wrote to memory of 2348 2480 omsecor.exe 32 PID 2480 wrote to memory of 2348 2480 omsecor.exe 32 PID 2480 wrote to memory of 2348 2480 omsecor.exe 32 PID 2480 wrote to memory of 2348 2480 omsecor.exe 32 PID 2480 wrote to memory of 2348 2480 omsecor.exe 32 PID 2348 wrote to memory of 3004 2348 omsecor.exe 35 PID 2348 wrote to memory of 3004 2348 omsecor.exe 35 PID 2348 wrote to memory of 3004 2348 omsecor.exe 35 PID 2348 wrote to memory of 3004 2348 omsecor.exe 35 PID 3004 wrote to memory of 1800 3004 omsecor.exe 36 PID 3004 wrote to memory of 1800 3004 omsecor.exe 36 PID 3004 wrote to memory of 1800 3004 omsecor.exe 36 PID 3004 wrote to memory of 1800 3004 omsecor.exe 36 PID 3004 wrote to memory of 1800 3004 omsecor.exe 36 PID 3004 wrote to memory of 1800 3004 omsecor.exe 36 PID 1800 wrote to memory of 1308 1800 omsecor.exe 37 PID 1800 wrote to memory of 1308 1800 omsecor.exe 37 PID 1800 wrote to memory of 1308 1800 omsecor.exe 37 PID 1800 wrote to memory of 1308 1800 omsecor.exe 37 PID 1308 wrote to memory of 2084 1308 omsecor.exe 38 PID 1308 wrote to memory of 2084 1308 omsecor.exe 38 PID 1308 wrote to memory of 2084 1308 omsecor.exe 38 PID 1308 wrote to memory of 2084 1308 omsecor.exe 38 PID 1308 wrote to memory of 2084 1308 omsecor.exe 38 PID 1308 wrote to memory of 2084 1308 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe"C:\Users\Admin\AppData\Local\Temp\c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exeC:\Users\Admin\AppData\Local\Temp\c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d0ad9fb677daa5735994745e533950c1
SHA1d466df3afad595f10dbac1176484081b661115b3
SHA2568bf742aa1c5185b1faade0bda9b852f4c3f7e51e96bac0cc2261b25298fca8ef
SHA512ac55606ccea098bd556c7d1636621a45ea22ae454c28e12ff8f802b2cd64b3e39531efbcb08a75b04477bab8a8353f51c68b14a8239115a4ddde27a6d90511da
-
Filesize
96KB
MD5a6494b63e5f5d7b90c58a151d5c47bb3
SHA1a816c2a022d97d84f726583f041a47695347aea2
SHA256475fc7467f5b3800ce2a4bf554228dc32b3fc94b3e6c22ee8720ac80d4001e3a
SHA5128320e82045506707fff852ab1cdaf733659943efdbb7617250f97e43691b32b74cd348cf661bdffd7e05e8269471291f2b3b52ebe7109f66afc7e64aba6a27ca
-
Filesize
96KB
MD5a13000da4930c5c7e3a22dc7ead2b876
SHA1bbf5007c9c85b64879300008a86b9c6e1c57a45b
SHA256a3e166bd58010582ecae1fea2d3c0c14ccd65a0f84c5f3445e5f577f4b8d7e3e
SHA512f3d5f422e1ee6783ea3d88a5051549792051ea81bc59272214e16c6b6ce339b8edb25525afb05509fe62fb0201dc61762fe12ddd65a03729b1c3c7a7149f4762