Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 11:23
Static task
static1
Behavioral task
behavioral1
Sample
fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe
Resource
win7-20240903-en
General
-
Target
fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe
-
Size
96KB
-
MD5
62e4558b0fdffc45964bb16a5a23a5ee
-
SHA1
fb067f4423b7c85df8565b27ff015fa5f8e35b23
-
SHA256
fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d
-
SHA512
7ccecace029db244772aa3637b9b6bb283ddaacbdde08cbc6e95290fdd790a2cd0be97b37ae7478a4b1dd443365ef87b561fa369e5b5a562b33506509417ede9
-
SSDEEP
1536:4nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:4Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2784 omsecor.exe 2340 omsecor.exe 1888 omsecor.exe 1416 omsecor.exe 2356 omsecor.exe 1292 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2656 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 2656 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 2784 omsecor.exe 2340 omsecor.exe 2340 omsecor.exe 1416 omsecor.exe 1416 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2736 set thread context of 2656 2736 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 30 PID 2784 set thread context of 2340 2784 omsecor.exe 32 PID 1888 set thread context of 1416 1888 omsecor.exe 36 PID 2356 set thread context of 1292 2356 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2656 2736 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 30 PID 2736 wrote to memory of 2656 2736 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 30 PID 2736 wrote to memory of 2656 2736 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 30 PID 2736 wrote to memory of 2656 2736 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 30 PID 2736 wrote to memory of 2656 2736 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 30 PID 2736 wrote to memory of 2656 2736 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 30 PID 2656 wrote to memory of 2784 2656 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 31 PID 2656 wrote to memory of 2784 2656 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 31 PID 2656 wrote to memory of 2784 2656 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 31 PID 2656 wrote to memory of 2784 2656 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 31 PID 2784 wrote to memory of 2340 2784 omsecor.exe 32 PID 2784 wrote to memory of 2340 2784 omsecor.exe 32 PID 2784 wrote to memory of 2340 2784 omsecor.exe 32 PID 2784 wrote to memory of 2340 2784 omsecor.exe 32 PID 2784 wrote to memory of 2340 2784 omsecor.exe 32 PID 2784 wrote to memory of 2340 2784 omsecor.exe 32 PID 2340 wrote to memory of 1888 2340 omsecor.exe 35 PID 2340 wrote to memory of 1888 2340 omsecor.exe 35 PID 2340 wrote to memory of 1888 2340 omsecor.exe 35 PID 2340 wrote to memory of 1888 2340 omsecor.exe 35 PID 1888 wrote to memory of 1416 1888 omsecor.exe 36 PID 1888 wrote to memory of 1416 1888 omsecor.exe 36 PID 1888 wrote to memory of 1416 1888 omsecor.exe 36 PID 1888 wrote to memory of 1416 1888 omsecor.exe 36 PID 1888 wrote to memory of 1416 1888 omsecor.exe 36 PID 1888 wrote to memory of 1416 1888 omsecor.exe 36 PID 1416 wrote to memory of 2356 1416 omsecor.exe 37 PID 1416 wrote to memory of 2356 1416 omsecor.exe 37 PID 1416 wrote to memory of 2356 1416 omsecor.exe 37 PID 1416 wrote to memory of 2356 1416 omsecor.exe 37 PID 2356 wrote to memory of 1292 2356 omsecor.exe 38 PID 2356 wrote to memory of 1292 2356 omsecor.exe 38 PID 2356 wrote to memory of 1292 2356 omsecor.exe 38 PID 2356 wrote to memory of 1292 2356 omsecor.exe 38 PID 2356 wrote to memory of 1292 2356 omsecor.exe 38 PID 2356 wrote to memory of 1292 2356 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe"C:\Users\Admin\AppData\Local\Temp\fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exeC:\Users\Admin\AppData\Local\Temp\fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1292
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56fe5522c701c5b1122616b91652e5dd6
SHA140edd3e6c6c94ef5af55ec00ab03dbe40598da57
SHA25668afc70600a8bad5dd5d95a6c0342032075a25189d0b720cbb1c1699da34dc82
SHA51229d2553011fd17f280a5e7f8538b734d0d0d0d40d0964ca33f6c293d59da4d78071ad8da9495a9dbd06a7e8b8da61e515e201f7ea25c3a83765c753b801bfaaa
-
Filesize
96KB
MD5993617a18c826596e0c616ee1603a7dc
SHA111e4ed23c39c2043a489878d3fb79731405d8596
SHA25693545b0dc8e80c177ec46dd243e67e7f89f8f4fcc7e488353d0f66f5302f48e3
SHA5126cef840518d6cdc879aa4bef12049f09328eb12c787acd86f8e06ea79b1494aef626b2e0026c57047262d180bfc017d8785c1238a190c3c4b9ca94483462adef
-
Filesize
96KB
MD5b310b8d014adf07c42f4406ad0b5a6cb
SHA1392c8222797712fa24abc9dfea3bc96381e96adc
SHA2564f2be8f9bc5663d654ea05172a372b209ce65b3e14d3443042a5238d1c48bc33
SHA51212f09cc50f77839350fd3e983cea9e012d8425f695c9bb9f5d842a1ed9cfdaf9232eef969ae906210e43f7df5e35f69002866694a6c041debbf167a5ae5c74ec