Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 23:13
Static task
static1
Behavioral task
behavioral1
Sample
0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe
Resource
win7-20241023-en
General
-
Target
0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe
-
Size
96KB
-
MD5
fc5a521412e14ee3f5b104f3dedadc8d
-
SHA1
59680b4ac14161838dd50c7eb936cc63330c3b55
-
SHA256
0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5
-
SHA512
30d02b940b8a4f959e0aec29a6c382a6dd214a0453ee1e3c7ce83a23aeeeb1520ef4075568ac270f4ba5b0ee771475b65e96b595fa6a00495d6ae7bd14ae5812
-
SSDEEP
1536:HnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:HGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1500 omsecor.exe 2264 omsecor.exe 2384 omsecor.exe 1048 omsecor.exe 1860 omsecor.exe 2932 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2168 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 2168 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 1500 omsecor.exe 2264 omsecor.exe 2264 omsecor.exe 1048 omsecor.exe 1048 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3036 set thread context of 2168 3036 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 30 PID 1500 set thread context of 2264 1500 omsecor.exe 32 PID 2384 set thread context of 1048 2384 omsecor.exe 36 PID 1860 set thread context of 2932 1860 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2168 3036 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 30 PID 3036 wrote to memory of 2168 3036 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 30 PID 3036 wrote to memory of 2168 3036 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 30 PID 3036 wrote to memory of 2168 3036 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 30 PID 3036 wrote to memory of 2168 3036 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 30 PID 3036 wrote to memory of 2168 3036 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 30 PID 2168 wrote to memory of 1500 2168 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 31 PID 2168 wrote to memory of 1500 2168 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 31 PID 2168 wrote to memory of 1500 2168 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 31 PID 2168 wrote to memory of 1500 2168 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 31 PID 1500 wrote to memory of 2264 1500 omsecor.exe 32 PID 1500 wrote to memory of 2264 1500 omsecor.exe 32 PID 1500 wrote to memory of 2264 1500 omsecor.exe 32 PID 1500 wrote to memory of 2264 1500 omsecor.exe 32 PID 1500 wrote to memory of 2264 1500 omsecor.exe 32 PID 1500 wrote to memory of 2264 1500 omsecor.exe 32 PID 2264 wrote to memory of 2384 2264 omsecor.exe 35 PID 2264 wrote to memory of 2384 2264 omsecor.exe 35 PID 2264 wrote to memory of 2384 2264 omsecor.exe 35 PID 2264 wrote to memory of 2384 2264 omsecor.exe 35 PID 2384 wrote to memory of 1048 2384 omsecor.exe 36 PID 2384 wrote to memory of 1048 2384 omsecor.exe 36 PID 2384 wrote to memory of 1048 2384 omsecor.exe 36 PID 2384 wrote to memory of 1048 2384 omsecor.exe 36 PID 2384 wrote to memory of 1048 2384 omsecor.exe 36 PID 2384 wrote to memory of 1048 2384 omsecor.exe 36 PID 1048 wrote to memory of 1860 1048 omsecor.exe 37 PID 1048 wrote to memory of 1860 1048 omsecor.exe 37 PID 1048 wrote to memory of 1860 1048 omsecor.exe 37 PID 1048 wrote to memory of 1860 1048 omsecor.exe 37 PID 1860 wrote to memory of 2932 1860 omsecor.exe 38 PID 1860 wrote to memory of 2932 1860 omsecor.exe 38 PID 1860 wrote to memory of 2932 1860 omsecor.exe 38 PID 1860 wrote to memory of 2932 1860 omsecor.exe 38 PID 1860 wrote to memory of 2932 1860 omsecor.exe 38 PID 1860 wrote to memory of 2932 1860 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe"C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exeC:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55426ac3522d36db2f82844fe2b686018
SHA1bf4da61b45f2e0f084d21b423d59364bf79ce082
SHA256f6ef8b48f1e7dad6453cfbe679899863d8cad610e0280d2e2e6465af1d120efb
SHA512e11d5ac86cd699c7ad2b8d0acfce64f681ff03295a81304e4a79f22507d2f44ed70d9d93f7d96107ed4b6fd19a2ef5817ba2a22bfd28efb3dd4b237441bb241e
-
Filesize
96KB
MD5964d7a881a43f4be73514276d5ef488c
SHA12104fb5cf7a056cd104f633c0ece5b50f600b20b
SHA256318154a47ecd029c05982e2a8239f19badcf2c057af33be55daf8b5702555ede
SHA512277dd506adb199ac55c2c61b7d589b25a26a22ca19f4ad8826f85f1cb5fc5e9818382e54b2804d4283bc7a68e778793459e43321d09b219edbc2b9f9460968b5
-
Filesize
96KB
MD5f22085ae35b7c3054796294f4d0498fe
SHA162cd6a8b6aea1c3e3bd8fc60aff38f62152d542b
SHA25696946a1a537842062e55f8fd51d86c80176f80f06a66e8304b4c6f54ac59dec2
SHA512b3b15a4c933454c2f4a593119f5957d2fe6de2e41c58712a2d1b66044094ebdbb725ed4d2ca9ae88c4676d0851f01d9d352d9da6ccc841fa0cf1214a3d1f0f15