Analysis
-
max time kernel
120s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 21:49
Static task
static1
Behavioral task
behavioral1
Sample
75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe
Resource
win7-20240903-en
General
-
Target
75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe
-
Size
96KB
-
MD5
52f894d5e05afd7a0c3e3f494103bd74
-
SHA1
39288ac93279ffffe529338f52a0662dfc3171c4
-
SHA256
75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da
-
SHA512
60b4f1f80a3dc940383e6cc677a12b0e933993b4c307e366dab961e3050b0c6afc138d852a487c5d671adc9a43c955eea77e98e2efa9b57ad0f4f46bd08da479
-
SSDEEP
1536:HnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:HGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1072 omsecor.exe 2468 omsecor.exe 1536 omsecor.exe 300 omsecor.exe 556 omsecor.exe 2832 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2112 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 2112 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 1072 omsecor.exe 2468 omsecor.exe 2468 omsecor.exe 300 omsecor.exe 300 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2408 set thread context of 2112 2408 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 1072 set thread context of 2468 1072 omsecor.exe 32 PID 1536 set thread context of 300 1536 omsecor.exe 36 PID 556 set thread context of 2832 556 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2112 2408 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2408 wrote to memory of 2112 2408 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2408 wrote to memory of 2112 2408 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2408 wrote to memory of 2112 2408 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2408 wrote to memory of 2112 2408 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2408 wrote to memory of 2112 2408 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2112 wrote to memory of 1072 2112 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 31 PID 2112 wrote to memory of 1072 2112 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 31 PID 2112 wrote to memory of 1072 2112 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 31 PID 2112 wrote to memory of 1072 2112 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 31 PID 1072 wrote to memory of 2468 1072 omsecor.exe 32 PID 1072 wrote to memory of 2468 1072 omsecor.exe 32 PID 1072 wrote to memory of 2468 1072 omsecor.exe 32 PID 1072 wrote to memory of 2468 1072 omsecor.exe 32 PID 1072 wrote to memory of 2468 1072 omsecor.exe 32 PID 1072 wrote to memory of 2468 1072 omsecor.exe 32 PID 2468 wrote to memory of 1536 2468 omsecor.exe 35 PID 2468 wrote to memory of 1536 2468 omsecor.exe 35 PID 2468 wrote to memory of 1536 2468 omsecor.exe 35 PID 2468 wrote to memory of 1536 2468 omsecor.exe 35 PID 1536 wrote to memory of 300 1536 omsecor.exe 36 PID 1536 wrote to memory of 300 1536 omsecor.exe 36 PID 1536 wrote to memory of 300 1536 omsecor.exe 36 PID 1536 wrote to memory of 300 1536 omsecor.exe 36 PID 1536 wrote to memory of 300 1536 omsecor.exe 36 PID 1536 wrote to memory of 300 1536 omsecor.exe 36 PID 300 wrote to memory of 556 300 omsecor.exe 37 PID 300 wrote to memory of 556 300 omsecor.exe 37 PID 300 wrote to memory of 556 300 omsecor.exe 37 PID 300 wrote to memory of 556 300 omsecor.exe 37 PID 556 wrote to memory of 2832 556 omsecor.exe 38 PID 556 wrote to memory of 2832 556 omsecor.exe 38 PID 556 wrote to memory of 2832 556 omsecor.exe 38 PID 556 wrote to memory of 2832 556 omsecor.exe 38 PID 556 wrote to memory of 2832 556 omsecor.exe 38 PID 556 wrote to memory of 2832 556 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe"C:\Users\Admin\AppData\Local\Temp\75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exeC:\Users\Admin\AppData\Local\Temp\75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD588ae9d0702a8a9df63390a9f61619b81
SHA1f1d25aefeec7071b0b9a8fcb335f431e08b152d4
SHA256cc0aa4a46f27081de7b809f8027abca8616f073fe0a65214c82a3649ebdb6886
SHA512fc3e9150ec373405a18b448047ac86f3a72db98d7fa0d963839eee69af3d9a7fa4547d12f743d489fa0c165b9f7a9b2470d5d937511b40dd9984baf94652ec99
-
Filesize
96KB
MD5799a918a1ce80748e3d0c5ec46d5bf85
SHA1ae4b80b26150dc965cb2d79b3c9373968343d5a6
SHA256eca3dd8984aff072664aa536bfbbda553150c677f89044c098c4776b72e10f42
SHA5122fc14ee53cdd6a5269e1b7752e49005afeb920ee1800daf339c9c8b2f03907fecc9e7fc0871de0e06e3a871a5b7e4bc10880239615526054ece564fde49499c2
-
Filesize
96KB
MD5bdc84fe73be08424d343a9fe16fdbf51
SHA1ac7e470406ab5f0dbf51ae4803d2dbdd1552e8dc
SHA256178f30024af8995be095a9f9a0523120a145c844f5015c446636c1e4d063709b
SHA5125f8ea8301c5825b7afb6976ff741675aa847e0f89c44185e33a60ead4f33846b34d75ea783bc9d071aad6a05a593c91cc02e24f811ad943ba6e2cbf5f1a1efe8