Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 04:32
Static task
static1
Behavioral task
behavioral1
Sample
86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe
Resource
win7-20240903-en
General
-
Target
86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe
-
Size
96KB
-
MD5
07fbed2884abf65aa0130d7b72c8650c
-
SHA1
66c0e7809a326272f8a5ff74bbe37a9538d1730f
-
SHA256
86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a
-
SHA512
7a4a2e6448756ff14d5643ae020635f2212975cf45c0ef593d97e271d98aa69eac3fde9680caff2ac271346fc13e395af8bd178a5a1e9bf2fcb42b84b889e13a
-
SSDEEP
1536:BnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxD:BGs8cd8eXlYairZYqMddH13D
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2032 omsecor.exe 2724 omsecor.exe 2504 omsecor.exe 2600 omsecor.exe 2740 omsecor.exe 2876 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2060 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 2060 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 2032 omsecor.exe 2724 omsecor.exe 2724 omsecor.exe 2600 omsecor.exe 2600 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2100 set thread context of 2060 2100 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 31 PID 2032 set thread context of 2724 2032 omsecor.exe 33 PID 2504 set thread context of 2600 2504 omsecor.exe 36 PID 2740 set thread context of 2876 2740 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2060 2100 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 31 PID 2100 wrote to memory of 2060 2100 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 31 PID 2100 wrote to memory of 2060 2100 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 31 PID 2100 wrote to memory of 2060 2100 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 31 PID 2100 wrote to memory of 2060 2100 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 31 PID 2100 wrote to memory of 2060 2100 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 31 PID 2060 wrote to memory of 2032 2060 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 32 PID 2060 wrote to memory of 2032 2060 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 32 PID 2060 wrote to memory of 2032 2060 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 32 PID 2060 wrote to memory of 2032 2060 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 32 PID 2032 wrote to memory of 2724 2032 omsecor.exe 33 PID 2032 wrote to memory of 2724 2032 omsecor.exe 33 PID 2032 wrote to memory of 2724 2032 omsecor.exe 33 PID 2032 wrote to memory of 2724 2032 omsecor.exe 33 PID 2032 wrote to memory of 2724 2032 omsecor.exe 33 PID 2032 wrote to memory of 2724 2032 omsecor.exe 33 PID 2724 wrote to memory of 2504 2724 omsecor.exe 35 PID 2724 wrote to memory of 2504 2724 omsecor.exe 35 PID 2724 wrote to memory of 2504 2724 omsecor.exe 35 PID 2724 wrote to memory of 2504 2724 omsecor.exe 35 PID 2504 wrote to memory of 2600 2504 omsecor.exe 36 PID 2504 wrote to memory of 2600 2504 omsecor.exe 36 PID 2504 wrote to memory of 2600 2504 omsecor.exe 36 PID 2504 wrote to memory of 2600 2504 omsecor.exe 36 PID 2504 wrote to memory of 2600 2504 omsecor.exe 36 PID 2504 wrote to memory of 2600 2504 omsecor.exe 36 PID 2600 wrote to memory of 2740 2600 omsecor.exe 37 PID 2600 wrote to memory of 2740 2600 omsecor.exe 37 PID 2600 wrote to memory of 2740 2600 omsecor.exe 37 PID 2600 wrote to memory of 2740 2600 omsecor.exe 37 PID 2740 wrote to memory of 2876 2740 omsecor.exe 38 PID 2740 wrote to memory of 2876 2740 omsecor.exe 38 PID 2740 wrote to memory of 2876 2740 omsecor.exe 38 PID 2740 wrote to memory of 2876 2740 omsecor.exe 38 PID 2740 wrote to memory of 2876 2740 omsecor.exe 38 PID 2740 wrote to memory of 2876 2740 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe"C:\Users\Admin\AppData\Local\Temp\86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exeC:\Users\Admin\AppData\Local\Temp\86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58fe9b7e0d174a569c08c02971c3c112d
SHA18844f29291703647e2a7152a3ef385ebfd02da91
SHA2569bbd451eb2534b3a101ab5b47ad7db6f6b6a14f9a890f8724ced29223cd7c30d
SHA512fe5d37c06983142eab8551b66ec8cad9f2892921dc3c5184fa7ab7841bcf3c680492a2439090d0546a384c0c577e03c593342407fe8c37f927684e75306f3f02
-
Filesize
96KB
MD5be61b238797ff4544b5545634dd7eb3e
SHA1d68bf58807ea44e7c85014b35ddc984c2a52445f
SHA256ae4f064c96bb5b03d6f129dec7f077a6bc42fc3d7ebef16e433967e34a6e8f9b
SHA512d8f2b5e49b84bc52166184f02aa1841ff58bd23985451e6e5f196a973b5110bc1520d0d38b31f527acdcf8937aaccc65c66e4ae679430568154689eca03a1faf
-
Filesize
96KB
MD5029f09ff03634f6d979e805a6f091aaf
SHA1e3ca7e6af9c9cbe667fe0a54a871e20353e68de6
SHA256ab7b59318a6a0e29a3d313e1996e0cc4453fc3bd792c08a4a5c0f2bd9af5e7b4
SHA5123a2cbe42ec1355a8d952f73f08dd277db42cace10818a057f3c34b292a1192d2ea7b7d3656ea5e40cc36248da6717e311daf8f21ce29e1866779bd6fae628b25