Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 01:45
Static task
static1
Behavioral task
behavioral1
Sample
481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
Resource
win7-20240903-en
General
-
Target
481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
-
Size
96KB
-
MD5
e33561a5d465e9efe456d20a8c0e24bd
-
SHA1
1aa6e4583896e70a1dd33e603f6e46308a050913
-
SHA256
481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4
-
SHA512
097dcc25e348a1fb5857e14e4097301893dc2c4f47d8e9f63e216710fb916b3d035a2c0f233fd219235fd59afb9d2d774cbe4827b4d71fa23e5962d7f24d6d63
-
SSDEEP
1536:ynAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxJ:yGs8cd8eXlYairZYqMddH13J
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2812 omsecor.exe 2684 omsecor.exe 752 omsecor.exe 2884 omsecor.exe 2892 omsecor.exe 2288 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1364 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 1364 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 2812 omsecor.exe 2684 omsecor.exe 2684 omsecor.exe 2884 omsecor.exe 2884 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2644 set thread context of 1364 2644 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 30 PID 2812 set thread context of 2684 2812 omsecor.exe 32 PID 752 set thread context of 2884 752 omsecor.exe 36 PID 2892 set thread context of 2288 2892 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1364 2644 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 30 PID 2644 wrote to memory of 1364 2644 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 30 PID 2644 wrote to memory of 1364 2644 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 30 PID 2644 wrote to memory of 1364 2644 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 30 PID 2644 wrote to memory of 1364 2644 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 30 PID 2644 wrote to memory of 1364 2644 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 30 PID 1364 wrote to memory of 2812 1364 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 31 PID 1364 wrote to memory of 2812 1364 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 31 PID 1364 wrote to memory of 2812 1364 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 31 PID 1364 wrote to memory of 2812 1364 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 31 PID 2812 wrote to memory of 2684 2812 omsecor.exe 32 PID 2812 wrote to memory of 2684 2812 omsecor.exe 32 PID 2812 wrote to memory of 2684 2812 omsecor.exe 32 PID 2812 wrote to memory of 2684 2812 omsecor.exe 32 PID 2812 wrote to memory of 2684 2812 omsecor.exe 32 PID 2812 wrote to memory of 2684 2812 omsecor.exe 32 PID 2684 wrote to memory of 752 2684 omsecor.exe 35 PID 2684 wrote to memory of 752 2684 omsecor.exe 35 PID 2684 wrote to memory of 752 2684 omsecor.exe 35 PID 2684 wrote to memory of 752 2684 omsecor.exe 35 PID 752 wrote to memory of 2884 752 omsecor.exe 36 PID 752 wrote to memory of 2884 752 omsecor.exe 36 PID 752 wrote to memory of 2884 752 omsecor.exe 36 PID 752 wrote to memory of 2884 752 omsecor.exe 36 PID 752 wrote to memory of 2884 752 omsecor.exe 36 PID 752 wrote to memory of 2884 752 omsecor.exe 36 PID 2884 wrote to memory of 2892 2884 omsecor.exe 37 PID 2884 wrote to memory of 2892 2884 omsecor.exe 37 PID 2884 wrote to memory of 2892 2884 omsecor.exe 37 PID 2884 wrote to memory of 2892 2884 omsecor.exe 37 PID 2892 wrote to memory of 2288 2892 omsecor.exe 38 PID 2892 wrote to memory of 2288 2892 omsecor.exe 38 PID 2892 wrote to memory of 2288 2892 omsecor.exe 38 PID 2892 wrote to memory of 2288 2892 omsecor.exe 38 PID 2892 wrote to memory of 2288 2892 omsecor.exe 38 PID 2892 wrote to memory of 2288 2892 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe"C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exeC:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53c5d6230f85d3bd9cf32bd465c3463ff
SHA18bec94428b67ff1c8efcda13c83ea454a208f057
SHA2563e0254282f6415bd9e3329007f2ea13083367f0b382bcb03b2c827128eef2e07
SHA512d42b16b679f0208ab06779b6bc7a5ddc26a485be0bb9b68b67117557abea5125e004e35e69bee0051ba7046a77564eda44e1e25c3a408715a734d65f6bcde2b3
-
Filesize
96KB
MD57ffd5be8a0318382766605cf46718777
SHA1d0fdbbf71d9e43a56f9fa6d621bc3a8bc9ab57dd
SHA2560b221066aa8fc4274e6433e2d65ab685c9ea79886c69890b0b2011edfbf1059b
SHA512dc509c4da21640efd4427de1c756adab535a5ef0740e8219e702725da2a2b9f2bb56a3824933f544a6f4f2326c3d6bb97752d5e71c65fac253c57f4e6a0ac3cc
-
Filesize
96KB
MD56d7e728d9755506b5593466cc8df9f08
SHA1f0288ee3ba6c7919002542513ecf987c6f45bb7b
SHA2563d6c7dc3eb040d30cf0052c392988572c01641c87b0dda396ca54f05ec587d3c
SHA512cf39ff4e8f52ed8121fbdef9fcb72df680d1bb3823e4a2886d1cfebb386208775e39e5fe127d9a106d4522338fd2b77451202820eea5a9898e08d81d0a9582b6