Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 04:56
Static task
static1
Behavioral task
behavioral1
Sample
95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe
Resource
win7-20241023-en
General
-
Target
95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe
-
Size
96KB
-
MD5
0227405c46639b2222a17b83703ea91d
-
SHA1
7ad2d760e13d1751c215bff82a1fc2f72c921c6c
-
SHA256
95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826
-
SHA512
4ec8b16e975fab0714d79c3b579037ae4dc50d3ab75eadbfa62f606e299f9fd0e4727870e0ebc61eaa8ff0e6eab14377a9020980ddbb9ef9631118639ac6618f
-
SSDEEP
1536:NnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:NGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2200 omsecor.exe 648 omsecor.exe 1760 omsecor.exe 1540 omsecor.exe 1776 omsecor.exe 2988 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2616 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 2616 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 2200 omsecor.exe 648 omsecor.exe 648 omsecor.exe 1540 omsecor.exe 1540 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2088 set thread context of 2616 2088 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 30 PID 2200 set thread context of 648 2200 omsecor.exe 32 PID 1760 set thread context of 1540 1760 omsecor.exe 36 PID 1776 set thread context of 2988 1776 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2616 2088 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 30 PID 2088 wrote to memory of 2616 2088 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 30 PID 2088 wrote to memory of 2616 2088 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 30 PID 2088 wrote to memory of 2616 2088 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 30 PID 2088 wrote to memory of 2616 2088 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 30 PID 2088 wrote to memory of 2616 2088 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 30 PID 2616 wrote to memory of 2200 2616 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 31 PID 2616 wrote to memory of 2200 2616 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 31 PID 2616 wrote to memory of 2200 2616 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 31 PID 2616 wrote to memory of 2200 2616 95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe 31 PID 2200 wrote to memory of 648 2200 omsecor.exe 32 PID 2200 wrote to memory of 648 2200 omsecor.exe 32 PID 2200 wrote to memory of 648 2200 omsecor.exe 32 PID 2200 wrote to memory of 648 2200 omsecor.exe 32 PID 2200 wrote to memory of 648 2200 omsecor.exe 32 PID 2200 wrote to memory of 648 2200 omsecor.exe 32 PID 648 wrote to memory of 1760 648 omsecor.exe 35 PID 648 wrote to memory of 1760 648 omsecor.exe 35 PID 648 wrote to memory of 1760 648 omsecor.exe 35 PID 648 wrote to memory of 1760 648 omsecor.exe 35 PID 1760 wrote to memory of 1540 1760 omsecor.exe 36 PID 1760 wrote to memory of 1540 1760 omsecor.exe 36 PID 1760 wrote to memory of 1540 1760 omsecor.exe 36 PID 1760 wrote to memory of 1540 1760 omsecor.exe 36 PID 1760 wrote to memory of 1540 1760 omsecor.exe 36 PID 1760 wrote to memory of 1540 1760 omsecor.exe 36 PID 1540 wrote to memory of 1776 1540 omsecor.exe 37 PID 1540 wrote to memory of 1776 1540 omsecor.exe 37 PID 1540 wrote to memory of 1776 1540 omsecor.exe 37 PID 1540 wrote to memory of 1776 1540 omsecor.exe 37 PID 1776 wrote to memory of 2988 1776 omsecor.exe 38 PID 1776 wrote to memory of 2988 1776 omsecor.exe 38 PID 1776 wrote to memory of 2988 1776 omsecor.exe 38 PID 1776 wrote to memory of 2988 1776 omsecor.exe 38 PID 1776 wrote to memory of 2988 1776 omsecor.exe 38 PID 1776 wrote to memory of 2988 1776 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe"C:\Users\Admin\AppData\Local\Temp\95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exeC:\Users\Admin\AppData\Local\Temp\95657944717b819a78e9a20d6a159167ce0ba71423b7e101ece9a2e7e3e3d826.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e9470ecb24071cfddb9f6514f7fd7668
SHA15cc474de5d81b3d88e5f1f9ab2a355e16b8f9ff2
SHA25624525ddd73ea62d3d419c42cfadc60adccdcad6585a74d9d99c2cc1fd56e449d
SHA512f638015f693251933ba3ce638bb2595ebfa9e4d2547a6e7772a72d0e03c940f91d64d49948f03d932555d7433f1eba672fd42cd0d4baf94ec3c574e2ac792eb1
-
Filesize
96KB
MD5e9bc117e1c443d98cd6304805e1cb61e
SHA1cdfe8609cc7a28b36bccae6d104dc3f2a2f96d11
SHA256bbcc37e2ecf73889a3662ae725db32b82e726cda29c84396734ba7892cb8ed3d
SHA512ce9f17211c49fa7e11546db22ae00782e2003754779a80ccf751eae452f92114f859ee472c0d7c509823d5f47f4e673377033f386d420a8291619b5e07e2f91e
-
Filesize
96KB
MD5b9048bce4277b1bcfc244769a99b09a1
SHA17edd0521405dcc1e93869325badc516929444135
SHA256d5879181b0e25e88ea62f3f7d14444f1e73c0bcb1322455feaf7df2a261f7f76
SHA512c04b12b0f2bef403dd5a3a761a004047eddaff48d85d29c81aa57d03b8dabcb6f67944dfb9494b4b9788574e4359899a081f4c89afbc1a316e5bb5002b777af2