Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 16:51
Static task
static1
Behavioral task
behavioral1
Sample
facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe
Resource
win7-20240903-en
General
-
Target
facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe
-
Size
96KB
-
MD5
2b3bf1308b7e79ef933b3d2592048f90
-
SHA1
387d9d6b78e9aa6fef3ddc5d08962a0c6711526c
-
SHA256
facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a
-
SHA512
3f86081d595862dd03a97f01ee65d25a5ab22f402edf98257060d398632efabdcbc0ad378b149d5dfd71fc98b70f4f43fd2faafafa6e5f4810722ac31b2ff25b
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:vGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2404 omsecor.exe 2744 omsecor.exe 2616 omsecor.exe 2540 omsecor.exe 1228 omsecor.exe 2392 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2816 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 2816 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 2404 omsecor.exe 2744 omsecor.exe 2744 omsecor.exe 2540 omsecor.exe 2540 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2804 set thread context of 2816 2804 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 31 PID 2404 set thread context of 2744 2404 omsecor.exe 33 PID 2616 set thread context of 2540 2616 omsecor.exe 36 PID 1228 set thread context of 2392 1228 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2816 2804 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 31 PID 2804 wrote to memory of 2816 2804 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 31 PID 2804 wrote to memory of 2816 2804 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 31 PID 2804 wrote to memory of 2816 2804 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 31 PID 2804 wrote to memory of 2816 2804 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 31 PID 2804 wrote to memory of 2816 2804 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 31 PID 2816 wrote to memory of 2404 2816 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 32 PID 2816 wrote to memory of 2404 2816 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 32 PID 2816 wrote to memory of 2404 2816 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 32 PID 2816 wrote to memory of 2404 2816 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe 32 PID 2404 wrote to memory of 2744 2404 omsecor.exe 33 PID 2404 wrote to memory of 2744 2404 omsecor.exe 33 PID 2404 wrote to memory of 2744 2404 omsecor.exe 33 PID 2404 wrote to memory of 2744 2404 omsecor.exe 33 PID 2404 wrote to memory of 2744 2404 omsecor.exe 33 PID 2404 wrote to memory of 2744 2404 omsecor.exe 33 PID 2744 wrote to memory of 2616 2744 omsecor.exe 35 PID 2744 wrote to memory of 2616 2744 omsecor.exe 35 PID 2744 wrote to memory of 2616 2744 omsecor.exe 35 PID 2744 wrote to memory of 2616 2744 omsecor.exe 35 PID 2616 wrote to memory of 2540 2616 omsecor.exe 36 PID 2616 wrote to memory of 2540 2616 omsecor.exe 36 PID 2616 wrote to memory of 2540 2616 omsecor.exe 36 PID 2616 wrote to memory of 2540 2616 omsecor.exe 36 PID 2616 wrote to memory of 2540 2616 omsecor.exe 36 PID 2616 wrote to memory of 2540 2616 omsecor.exe 36 PID 2540 wrote to memory of 1228 2540 omsecor.exe 37 PID 2540 wrote to memory of 1228 2540 omsecor.exe 37 PID 2540 wrote to memory of 1228 2540 omsecor.exe 37 PID 2540 wrote to memory of 1228 2540 omsecor.exe 37 PID 1228 wrote to memory of 2392 1228 omsecor.exe 38 PID 1228 wrote to memory of 2392 1228 omsecor.exe 38 PID 1228 wrote to memory of 2392 1228 omsecor.exe 38 PID 1228 wrote to memory of 2392 1228 omsecor.exe 38 PID 1228 wrote to memory of 2392 1228 omsecor.exe 38 PID 1228 wrote to memory of 2392 1228 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe"C:\Users\Admin\AppData\Local\Temp\facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exeC:\Users\Admin\AppData\Local\Temp\facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5aN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e6835ec9d4e951870ad46fe5021111ed
SHA1df2ec61803825f0e4d0fda0a9c26b8ae5e055f90
SHA2568a70358503ef5cc52b9da1c0508897b2a8144626ff04b1fcfed25d4b02f72a88
SHA512033664a8a2687435b9505223bcdff9fc60401976afa872fc474bf4fb90af39a6872348796e4a38845be11bf314ad2ab4d690557b7bb7dcceb309b6ae02067ab3
-
Filesize
96KB
MD51c190a9308343d4e06ddb69d23e3eaa2
SHA1f1dbf1b9bc052678ec282215034f37e54a4e6c0e
SHA256a76d66d79700dd1bad84fad4eb4380a920e4e5136aae0e460d2625d3f259a706
SHA51228b50f7d02701e202bc3f015c4733e540fac221b27317622094b7458fd31a53e136be776e2d251a2bddc9a369e020934c9df509155cab68948cb75852abc3d54
-
Filesize
96KB
MD593e77f144b7afb8f3359a13382dcc9ba
SHA16238878321773498bed1bcb8d92dae47e6d67acb
SHA256ef1b215feed8c90926b1e66447b44dcbc36638ed424eb5d577d8dca9dd8f2d07
SHA5129939818eefe7355810647fd0d00353ebdf6b569935a35a0f18993d4a49dac33342733a26869e156e0bc4a51535edab95ba076e75bff664079cebae9622bf2864