Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 10:42
Static task
static1
Behavioral task
behavioral1
Sample
2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe
Resource
win7-20240903-en
General
-
Target
2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe
-
Size
96KB
-
MD5
e7a3c0cf7bf716cfee35c2c08c3775d4
-
SHA1
9ec9865b9fee7fc69ae242229a1eedabc751d6f5
-
SHA256
2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd
-
SHA512
a489560654819eafe3d23567d8bd4d45f27ad8eda548c04fec23fc576e724df87381d4f4d9d518681c4d81a83602895e09aa06845d3f6488409fb64cf91c800b
-
SSDEEP
1536:rnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:rGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2892 omsecor.exe 1596 omsecor.exe 2688 omsecor.exe 1636 omsecor.exe 1440 omsecor.exe 3068 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2212 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 2212 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 2892 omsecor.exe 1596 omsecor.exe 1596 omsecor.exe 1636 omsecor.exe 1636 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2224 set thread context of 2212 2224 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 30 PID 2892 set thread context of 1596 2892 omsecor.exe 32 PID 2688 set thread context of 1636 2688 omsecor.exe 36 PID 1440 set thread context of 3068 1440 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2212 2224 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 30 PID 2224 wrote to memory of 2212 2224 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 30 PID 2224 wrote to memory of 2212 2224 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 30 PID 2224 wrote to memory of 2212 2224 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 30 PID 2224 wrote to memory of 2212 2224 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 30 PID 2224 wrote to memory of 2212 2224 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 30 PID 2212 wrote to memory of 2892 2212 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 31 PID 2212 wrote to memory of 2892 2212 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 31 PID 2212 wrote to memory of 2892 2212 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 31 PID 2212 wrote to memory of 2892 2212 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 31 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 2892 wrote to memory of 1596 2892 omsecor.exe 32 PID 1596 wrote to memory of 2688 1596 omsecor.exe 35 PID 1596 wrote to memory of 2688 1596 omsecor.exe 35 PID 1596 wrote to memory of 2688 1596 omsecor.exe 35 PID 1596 wrote to memory of 2688 1596 omsecor.exe 35 PID 2688 wrote to memory of 1636 2688 omsecor.exe 36 PID 2688 wrote to memory of 1636 2688 omsecor.exe 36 PID 2688 wrote to memory of 1636 2688 omsecor.exe 36 PID 2688 wrote to memory of 1636 2688 omsecor.exe 36 PID 2688 wrote to memory of 1636 2688 omsecor.exe 36 PID 2688 wrote to memory of 1636 2688 omsecor.exe 36 PID 1636 wrote to memory of 1440 1636 omsecor.exe 37 PID 1636 wrote to memory of 1440 1636 omsecor.exe 37 PID 1636 wrote to memory of 1440 1636 omsecor.exe 37 PID 1636 wrote to memory of 1440 1636 omsecor.exe 37 PID 1440 wrote to memory of 3068 1440 omsecor.exe 38 PID 1440 wrote to memory of 3068 1440 omsecor.exe 38 PID 1440 wrote to memory of 3068 1440 omsecor.exe 38 PID 1440 wrote to memory of 3068 1440 omsecor.exe 38 PID 1440 wrote to memory of 3068 1440 omsecor.exe 38 PID 1440 wrote to memory of 3068 1440 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe"C:\Users\Admin\AppData\Local\Temp\2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exeC:\Users\Admin\AppData\Local\Temp\2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5213c49840cd0d83fb9de44d090810eb1
SHA14dad9969cab65dc9e14ec27c5bf895c990cdd869
SHA256e42924fbeba99d4fe46e5431bf380c541b7e2a79ad639dbb9aac0011d1876514
SHA51250d4315da03eb0fc4b71ba3467ba62b6136eb265438e8e93c18650a915eb92f25c1f546915892349a49c5889f2593e8847c8013a51220e7ae8925302562ba748
-
Filesize
96KB
MD5e4465ce16d973d05df5222c430c4fe8e
SHA145a854100a05104ee86523abe58001e63d1ff5c2
SHA2560697f373079829a1dd10665030c9bbf8f21115d4fc78d73ad6b8c2f78e6cbd2c
SHA51299b226bd9cb361e26de817c97a6b397956b89d8fa9e04c7496a7a26b2e40b4c04c371a832f5ded0135213a5ab9d08beb36369465279ee659a47860c895a0f16f
-
Filesize
96KB
MD52aaf6beff6e0b800b9618ced9c13939a
SHA13bdad982b8af44ab3112a52d6d489294aa5f4c0d
SHA256f92697418179dee4c1657e6b081682c75d92b33d6755c62dd3e5e6a0ed0f7410
SHA5122001e4e77e190557425da82cfdbe497fd7435753cc51c225b601e3fd66411b2ca32c28629c5ce19d9f1ac5c035d20e29fc17d50a96b6cd26b9b1b8a77129353d