Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 20:51
Static task
static1
Behavioral task
behavioral1
Sample
16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe
Resource
win7-20241023-en
General
-
Target
16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe
-
Size
96KB
-
MD5
9bc358419f7b5bb5a953c325eb5e452a
-
SHA1
0f28a48d670a8e1dd5dd9594a8a575e0ec72b66a
-
SHA256
16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73
-
SHA512
9ed8245bcb888d61605e9bc38ab450533101c56fd911f62aaad79e969d1061ade9f6fa276e4710943dd24f22b08bb391c5cce8ede55ae3f4aecb18415b98f64a
-
SSDEEP
1536:CnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:CGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2860 omsecor.exe 2800 omsecor.exe 3024 omsecor.exe 1316 omsecor.exe 1664 omsecor.exe 3052 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3060 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 3060 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 2860 omsecor.exe 2800 omsecor.exe 2800 omsecor.exe 1316 omsecor.exe 1316 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2876 set thread context of 3060 2876 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 30 PID 2860 set thread context of 2800 2860 omsecor.exe 32 PID 3024 set thread context of 1316 3024 omsecor.exe 36 PID 1664 set thread context of 3052 1664 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3060 2876 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 30 PID 2876 wrote to memory of 3060 2876 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 30 PID 2876 wrote to memory of 3060 2876 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 30 PID 2876 wrote to memory of 3060 2876 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 30 PID 2876 wrote to memory of 3060 2876 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 30 PID 2876 wrote to memory of 3060 2876 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 30 PID 3060 wrote to memory of 2860 3060 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 31 PID 3060 wrote to memory of 2860 3060 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 31 PID 3060 wrote to memory of 2860 3060 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 31 PID 3060 wrote to memory of 2860 3060 16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe 31 PID 2860 wrote to memory of 2800 2860 omsecor.exe 32 PID 2860 wrote to memory of 2800 2860 omsecor.exe 32 PID 2860 wrote to memory of 2800 2860 omsecor.exe 32 PID 2860 wrote to memory of 2800 2860 omsecor.exe 32 PID 2860 wrote to memory of 2800 2860 omsecor.exe 32 PID 2860 wrote to memory of 2800 2860 omsecor.exe 32 PID 2800 wrote to memory of 3024 2800 omsecor.exe 35 PID 2800 wrote to memory of 3024 2800 omsecor.exe 35 PID 2800 wrote to memory of 3024 2800 omsecor.exe 35 PID 2800 wrote to memory of 3024 2800 omsecor.exe 35 PID 3024 wrote to memory of 1316 3024 omsecor.exe 36 PID 3024 wrote to memory of 1316 3024 omsecor.exe 36 PID 3024 wrote to memory of 1316 3024 omsecor.exe 36 PID 3024 wrote to memory of 1316 3024 omsecor.exe 36 PID 3024 wrote to memory of 1316 3024 omsecor.exe 36 PID 3024 wrote to memory of 1316 3024 omsecor.exe 36 PID 1316 wrote to memory of 1664 1316 omsecor.exe 37 PID 1316 wrote to memory of 1664 1316 omsecor.exe 37 PID 1316 wrote to memory of 1664 1316 omsecor.exe 37 PID 1316 wrote to memory of 1664 1316 omsecor.exe 37 PID 1664 wrote to memory of 3052 1664 omsecor.exe 38 PID 1664 wrote to memory of 3052 1664 omsecor.exe 38 PID 1664 wrote to memory of 3052 1664 omsecor.exe 38 PID 1664 wrote to memory of 3052 1664 omsecor.exe 38 PID 1664 wrote to memory of 3052 1664 omsecor.exe 38 PID 1664 wrote to memory of 3052 1664 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe"C:\Users\Admin\AppData\Local\Temp\16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exeC:\Users\Admin\AppData\Local\Temp\16d34620936301f3100dd99654031866364b4f10debc78694aaa477e01103a73.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3052
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a4835e827298b89259b27574d536c498
SHA1a980add8cec0e5e9980c84da406ede5cbb050344
SHA256199c47b3319ef981eb8531fd3122a49eec52bc6940952ad4193f1398480884be
SHA5129994ce01acdb379a0011ed2561f23f8027a53f61e03793cd5f1d6fe7f4ffe1f8b5a0899a0cd0c0bbbc54109c00a58419b4c0ed9101f49a027f7ed953b8e26e4d
-
Filesize
96KB
MD5c482ca4ef1764f3b538abb72d95b3f47
SHA19c2202ba1e4c02ff8f35e48199d908e4f2361475
SHA25627f6bfbdb4ad5d511c0aaf397ad3b1279d969314eb97e94d1c18bea8b4a6a54e
SHA512ee1899e1e77e5c2c194c5a8856b72b54a7c28faf464e3ba0a16549d85122d7c9973c35b9d148fa10b16a17cfb6c5ea634607fda8891b52d02f93e67c5287d9f0
-
Filesize
96KB
MD542be648238a56e2f7d01b990af1f8081
SHA125d705f6ad332c8b0b96d9fe6729dadc2715b245
SHA2566c9cf4ddbbe8d833054565c5aee14e94bee6cd673b4644a5cf1fb07db5a0c7cf
SHA5125c0fd62472808015bd5ee9e341cb164dad98d060a41dc681e9e83f7cafaafb6e5ecfc056249fd2a48a7ac4600aa585c209c72226c9d4bb67a3a5aca1be7b5f4e