Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 11:52
Static task
static1
Behavioral task
behavioral1
Sample
073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe
Resource
win7-20241023-en
General
-
Target
073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe
-
Size
96KB
-
MD5
cd9bbefa014cd325ab8772ae0d20a370
-
SHA1
4ffd6ac0bd71f2fc8bbaa3e690ff7ed1344a28a2
-
SHA256
073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66
-
SHA512
69a56700f19f7298cf0ad599c3b4641548861e3d8d746b2043c0cc0c3a12e148b389b7a02045509e906b9bf718761b1b25367de47172665cf225e371afbf3327
-
SSDEEP
1536:HnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:HGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2224 omsecor.exe 2360 omsecor.exe 444 omsecor.exe 1516 omsecor.exe 1692 omsecor.exe 2324 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1860 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 1860 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 2224 omsecor.exe 2360 omsecor.exe 2360 omsecor.exe 1516 omsecor.exe 1516 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1672 set thread context of 1860 1672 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 30 PID 2224 set thread context of 2360 2224 omsecor.exe 32 PID 444 set thread context of 1516 444 omsecor.exe 36 PID 1692 set thread context of 2324 1692 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1860 1672 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 30 PID 1672 wrote to memory of 1860 1672 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 30 PID 1672 wrote to memory of 1860 1672 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 30 PID 1672 wrote to memory of 1860 1672 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 30 PID 1672 wrote to memory of 1860 1672 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 30 PID 1672 wrote to memory of 1860 1672 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 30 PID 1860 wrote to memory of 2224 1860 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 31 PID 1860 wrote to memory of 2224 1860 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 31 PID 1860 wrote to memory of 2224 1860 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 31 PID 1860 wrote to memory of 2224 1860 073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe 31 PID 2224 wrote to memory of 2360 2224 omsecor.exe 32 PID 2224 wrote to memory of 2360 2224 omsecor.exe 32 PID 2224 wrote to memory of 2360 2224 omsecor.exe 32 PID 2224 wrote to memory of 2360 2224 omsecor.exe 32 PID 2224 wrote to memory of 2360 2224 omsecor.exe 32 PID 2224 wrote to memory of 2360 2224 omsecor.exe 32 PID 2360 wrote to memory of 444 2360 omsecor.exe 35 PID 2360 wrote to memory of 444 2360 omsecor.exe 35 PID 2360 wrote to memory of 444 2360 omsecor.exe 35 PID 2360 wrote to memory of 444 2360 omsecor.exe 35 PID 444 wrote to memory of 1516 444 omsecor.exe 36 PID 444 wrote to memory of 1516 444 omsecor.exe 36 PID 444 wrote to memory of 1516 444 omsecor.exe 36 PID 444 wrote to memory of 1516 444 omsecor.exe 36 PID 444 wrote to memory of 1516 444 omsecor.exe 36 PID 444 wrote to memory of 1516 444 omsecor.exe 36 PID 1516 wrote to memory of 1692 1516 omsecor.exe 37 PID 1516 wrote to memory of 1692 1516 omsecor.exe 37 PID 1516 wrote to memory of 1692 1516 omsecor.exe 37 PID 1516 wrote to memory of 1692 1516 omsecor.exe 37 PID 1692 wrote to memory of 2324 1692 omsecor.exe 38 PID 1692 wrote to memory of 2324 1692 omsecor.exe 38 PID 1692 wrote to memory of 2324 1692 omsecor.exe 38 PID 1692 wrote to memory of 2324 1692 omsecor.exe 38 PID 1692 wrote to memory of 2324 1692 omsecor.exe 38 PID 1692 wrote to memory of 2324 1692 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe"C:\Users\Admin\AppData\Local\Temp\073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exeC:\Users\Admin\AppData\Local\Temp\073f024fb1923ce0297162adcfcfa2b22d568513f6942fc5a2ea5bea2885fb66N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57f4457ce53b447b679c89ade501eb727
SHA10dfd91a067053f528f37118157fffe83670152de
SHA2561f44817058135a9a9ed940e66aaabe559f7f070151d6edd09363fae86521f2b8
SHA512a42873acb9f80d87513e32607dc2f985481168639fc36532b80b69a4c9a6aa59d26b9cbeae443406a244fffe6464a4068b4d365e73fa8c7c79b8a513eb3c375a
-
Filesize
96KB
MD5f6b209a94232dde5cc26f9e1853ccd6d
SHA1abc16e559dfc6905b42be2b44f2fa76131ef01d7
SHA25688fc4c34ee892918b49e5092a649f40ad006c36cd365e9448a1229055f0487d7
SHA512f8a5ff391a467227c8de49b82833965f4a4d447c5c4e1c1204367640c3a8cf29287735d7607675f4f7927f36eb78f6b35927033a304a9defb35538116f079906
-
Filesize
96KB
MD5cb7a4f47a6ba60494fe6fa244b5dcfc3
SHA1f9da5343994fec5ae6a97e95f11c685b08c14093
SHA256f68c3cb883f45ab868c990206ea50572c6c4f420e58c256cce84d38364b34bed
SHA5120b1f0029cf00421ca01e6ca24066ea3e048c8b51e24d3c7e41334769cf183c12d616b3ea26d31f16f1dde9e186bff09854ee6f92f328410812e2a9425c1bc875