Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/01/2025, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe
Resource
win7-20240903-en
General
-
Target
75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe
-
Size
96KB
-
MD5
52f894d5e05afd7a0c3e3f494103bd74
-
SHA1
39288ac93279ffffe529338f52a0662dfc3171c4
-
SHA256
75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da
-
SHA512
60b4f1f80a3dc940383e6cc677a12b0e933993b4c307e366dab961e3050b0c6afc138d852a487c5d671adc9a43c955eea77e98e2efa9b57ad0f4f46bd08da479
-
SSDEEP
1536:HnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:HGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2892 omsecor.exe 1596 omsecor.exe 2900 omsecor.exe 2728 omsecor.exe 1268 omsecor.exe 3068 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2212 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 2212 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 2892 omsecor.exe 1596 omsecor.exe 1596 omsecor.exe 2728 omsecor.exe 2728 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2224 set thread context of 2212 2224 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2892 set thread context of 1596 2892 omsecor.exe 32 PID 2900 set thread context of 2728 2900 omsecor.exe 36 PID 1268 set thread context of 3068 1268 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2212 2224 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2224 wrote to memory of 2212 2224 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2224 wrote to memory of 2212 2224 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2224 wrote to memory of 2212 2224 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2224 wrote to memory of 2212 2224 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2224 wrote to memory of 2212 2224 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 30 PID 2212 wrote to memory of 2892 2212 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 31 PID 2212 wrote to memory of 2892 2212 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 31 PID 2212 wrote to memory of 2892 2212 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 31 PID 2212 wrote to memory of 2892 2212 75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe 31 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 1596 wrote to memory of 2900 1596 omsecor.exe 35 PID 1596 wrote to memory of 2900 1596 omsecor.exe 35 PID 1596 wrote to memory of 2900 1596 omsecor.exe 35 PID 1596 wrote to memory of 2900 1596 omsecor.exe 35 PID 2900 wrote to memory of 2728 2900 omsecor.exe 36 PID 2900 wrote to memory of 2728 2900 omsecor.exe 36 PID 2900 wrote to memory of 2728 2900 omsecor.exe 36 PID 2900 wrote to memory of 2728 2900 omsecor.exe 36 PID 2900 wrote to memory of 2728 2900 omsecor.exe 36 PID 2900 wrote to memory of 2728 2900 omsecor.exe 36 PID 2728 wrote to memory of 1268 2728 omsecor.exe 37 PID 2728 wrote to memory of 1268 2728 omsecor.exe 37 PID 2728 wrote to memory of 1268 2728 omsecor.exe 37 PID 2728 wrote to memory of 1268 2728 omsecor.exe 37 PID 1268 wrote to memory of 3068 1268 omsecor.exe 38 PID 1268 wrote to memory of 3068 1268 omsecor.exe 38 PID 1268 wrote to memory of 3068 1268 omsecor.exe 38 PID 1268 wrote to memory of 3068 1268 omsecor.exe 38 PID 1268 wrote to memory of 3068 1268 omsecor.exe 38 PID 1268 wrote to memory of 3068 1268 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe"C:\Users\Admin\AppData\Local\Temp\75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exeC:\Users\Admin\AppData\Local\Temp\75728f28e53fa173d612a532eb870dd0583e5e363026de08322103501baf57da.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD588ae9d0702a8a9df63390a9f61619b81
SHA1f1d25aefeec7071b0b9a8fcb335f431e08b152d4
SHA256cc0aa4a46f27081de7b809f8027abca8616f073fe0a65214c82a3649ebdb6886
SHA512fc3e9150ec373405a18b448047ac86f3a72db98d7fa0d963839eee69af3d9a7fa4547d12f743d489fa0c165b9f7a9b2470d5d937511b40dd9984baf94652ec99
-
Filesize
96KB
MD55bd5d89694d77a9608e77990edb78f1d
SHA1eee5c14c29791f3e517796df41ea31b1a795e333
SHA2563af833058dc3d1db4d267de036fc8f2b5b5a06372f33601d044b55ccea40645c
SHA512798a9d41608179b0d68f130c08da911d73f60e6ae4951639547d8a008f7e915b49d6ba5a057239f073a770f8d4ffaa932384f983ba6da1d887558fda5090804f
-
Filesize
96KB
MD56585732235c049b06b45876e5b043d39
SHA1a5c8af3d511402520aed317df531534753c5407e
SHA256139e4d8b1e4ae2d949cc02b70ebf6cfa16014561a5a5998beb504689d4749991
SHA51224790672c557e3aea87fb36018b9aed88424e00b984055344938f7a55f9481b3ba4db6fe5d9009120e1330ac2345142b27de8aed34bd19090d2fdbb51c37d903