Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 05:50
Static task
static1
Behavioral task
behavioral1
Sample
f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe
Resource
win7-20240903-en
General
-
Target
f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe
-
Size
96KB
-
MD5
0499bbe9425e490f9b4aee29884c0fc0
-
SHA1
3e8a1933871c4daca8a23fa840fb77a8da5b53ca
-
SHA256
f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25
-
SHA512
1383d194b990c7e0b4ed6452361731e9d412e2c809805a2ffae9c53b71ce72b9cf322e0cffebeff34e06bcf3d50bb7384d6e516c11fe13d8ed389791d9003c13
-
SSDEEP
1536:LnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:LGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2736 omsecor.exe 2784 omsecor.exe 2716 omsecor.exe 1880 omsecor.exe 1780 omsecor.exe 1996 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2772 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 2772 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 2736 omsecor.exe 2784 omsecor.exe 2784 omsecor.exe 1880 omsecor.exe 1880 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2892 set thread context of 2772 2892 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 30 PID 2736 set thread context of 2784 2736 omsecor.exe 32 PID 2716 set thread context of 1880 2716 omsecor.exe 36 PID 1780 set thread context of 1996 1780 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2772 2892 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 30 PID 2892 wrote to memory of 2772 2892 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 30 PID 2892 wrote to memory of 2772 2892 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 30 PID 2892 wrote to memory of 2772 2892 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 30 PID 2892 wrote to memory of 2772 2892 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 30 PID 2892 wrote to memory of 2772 2892 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 30 PID 2772 wrote to memory of 2736 2772 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 31 PID 2772 wrote to memory of 2736 2772 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 31 PID 2772 wrote to memory of 2736 2772 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 31 PID 2772 wrote to memory of 2736 2772 f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe 31 PID 2736 wrote to memory of 2784 2736 omsecor.exe 32 PID 2736 wrote to memory of 2784 2736 omsecor.exe 32 PID 2736 wrote to memory of 2784 2736 omsecor.exe 32 PID 2736 wrote to memory of 2784 2736 omsecor.exe 32 PID 2736 wrote to memory of 2784 2736 omsecor.exe 32 PID 2736 wrote to memory of 2784 2736 omsecor.exe 32 PID 2784 wrote to memory of 2716 2784 omsecor.exe 35 PID 2784 wrote to memory of 2716 2784 omsecor.exe 35 PID 2784 wrote to memory of 2716 2784 omsecor.exe 35 PID 2784 wrote to memory of 2716 2784 omsecor.exe 35 PID 2716 wrote to memory of 1880 2716 omsecor.exe 36 PID 2716 wrote to memory of 1880 2716 omsecor.exe 36 PID 2716 wrote to memory of 1880 2716 omsecor.exe 36 PID 2716 wrote to memory of 1880 2716 omsecor.exe 36 PID 2716 wrote to memory of 1880 2716 omsecor.exe 36 PID 2716 wrote to memory of 1880 2716 omsecor.exe 36 PID 1880 wrote to memory of 1780 1880 omsecor.exe 37 PID 1880 wrote to memory of 1780 1880 omsecor.exe 37 PID 1880 wrote to memory of 1780 1880 omsecor.exe 37 PID 1880 wrote to memory of 1780 1880 omsecor.exe 37 PID 1780 wrote to memory of 1996 1780 omsecor.exe 38 PID 1780 wrote to memory of 1996 1780 omsecor.exe 38 PID 1780 wrote to memory of 1996 1780 omsecor.exe 38 PID 1780 wrote to memory of 1996 1780 omsecor.exe 38 PID 1780 wrote to memory of 1996 1780 omsecor.exe 38 PID 1780 wrote to memory of 1996 1780 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe"C:\Users\Admin\AppData\Local\Temp\f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exeC:\Users\Admin\AppData\Local\Temp\f1c59ffd2332779dd6b34986893a03a55d1db62dddb7d0e0ec00e3237b843b25N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57952f500bf172e958c31c7a5be069646
SHA185d37a87273693327acee0484ad275b15ce11c3b
SHA256c931b1ca918decb8281e3efe0ed79afc97d61948abbdf7ea4498b86e3d1be57f
SHA512dbe5e2b5ff68830768b4c0d4bb48327c87f20a4f0c168b72c708b39463aba217c9daee3862cfcd8fe27a7c4591c5cede504bf693dcaecfb013839d3d36827aef
-
Filesize
96KB
MD5ee6a6dd21a125cdd59a7d3750df25fc1
SHA1051ced6503e4a0433150c2da4145e6c1cd549c1e
SHA256ff52616cd4cc593b8b9674b8205cd3b488b1a8f5e5757314f4c8f71b320ba472
SHA51298129ff3a57da6292f7032a7af098970c15fa5ced65d0ff34afa74d1f61732adc9609c529ddecc62a7b7c38d8d829b6d423113d9f0ffb6009d019fae9fbd79b6
-
Filesize
96KB
MD5cad89c61d79cff080095d7f2bc07042c
SHA18d41ddedeb93f1c6681e4a57564070db9c6db628
SHA256e1721befa6b7b6e896e7904d3052befd1562d1e15015030fce3c4c9e6c56f1e0
SHA512bc14f019811e3d29a58c6f563085555815214b02d13c85b6ca46194274e7b140550cf4c689b68220ed80c4e13b6a4d8f2261c81e53884449a3d74f1e1397c1b0