Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 16:44
Static task
static1
Behavioral task
behavioral1
Sample
33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe
Resource
win7-20240903-en
General
-
Target
33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe
-
Size
96KB
-
MD5
9c5a9ad759d63824e7e07c1a820259cf
-
SHA1
b666d9a995fca47c54d9cc9f8b329f3ae4dffa29
-
SHA256
33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b
-
SHA512
128eff79593bcb8b1dda902146c19e4db046274b78b427b15dc1048765d400e205e1c9b79d7189fe8b5ae0d2c4e7c25e5b0c7d34f5aeec9fcee21e905a2327da
-
SSDEEP
1536:OnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:OGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2748 omsecor.exe 1440 omsecor.exe 2848 omsecor.exe 540 omsecor.exe 580 omsecor.exe 1984 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2224 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 2224 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 2748 omsecor.exe 1440 omsecor.exe 1440 omsecor.exe 540 omsecor.exe 540 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2056 set thread context of 2224 2056 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 30 PID 2748 set thread context of 1440 2748 omsecor.exe 32 PID 2848 set thread context of 540 2848 omsecor.exe 36 PID 580 set thread context of 1984 580 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2224 2056 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 30 PID 2056 wrote to memory of 2224 2056 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 30 PID 2056 wrote to memory of 2224 2056 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 30 PID 2056 wrote to memory of 2224 2056 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 30 PID 2056 wrote to memory of 2224 2056 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 30 PID 2056 wrote to memory of 2224 2056 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 30 PID 2224 wrote to memory of 2748 2224 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 31 PID 2224 wrote to memory of 2748 2224 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 31 PID 2224 wrote to memory of 2748 2224 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 31 PID 2224 wrote to memory of 2748 2224 33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe 31 PID 2748 wrote to memory of 1440 2748 omsecor.exe 32 PID 2748 wrote to memory of 1440 2748 omsecor.exe 32 PID 2748 wrote to memory of 1440 2748 omsecor.exe 32 PID 2748 wrote to memory of 1440 2748 omsecor.exe 32 PID 2748 wrote to memory of 1440 2748 omsecor.exe 32 PID 2748 wrote to memory of 1440 2748 omsecor.exe 32 PID 1440 wrote to memory of 2848 1440 omsecor.exe 35 PID 1440 wrote to memory of 2848 1440 omsecor.exe 35 PID 1440 wrote to memory of 2848 1440 omsecor.exe 35 PID 1440 wrote to memory of 2848 1440 omsecor.exe 35 PID 2848 wrote to memory of 540 2848 omsecor.exe 36 PID 2848 wrote to memory of 540 2848 omsecor.exe 36 PID 2848 wrote to memory of 540 2848 omsecor.exe 36 PID 2848 wrote to memory of 540 2848 omsecor.exe 36 PID 2848 wrote to memory of 540 2848 omsecor.exe 36 PID 2848 wrote to memory of 540 2848 omsecor.exe 36 PID 540 wrote to memory of 580 540 omsecor.exe 37 PID 540 wrote to memory of 580 540 omsecor.exe 37 PID 540 wrote to memory of 580 540 omsecor.exe 37 PID 540 wrote to memory of 580 540 omsecor.exe 37 PID 580 wrote to memory of 1984 580 omsecor.exe 38 PID 580 wrote to memory of 1984 580 omsecor.exe 38 PID 580 wrote to memory of 1984 580 omsecor.exe 38 PID 580 wrote to memory of 1984 580 omsecor.exe 38 PID 580 wrote to memory of 1984 580 omsecor.exe 38 PID 580 wrote to memory of 1984 580 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe"C:\Users\Admin\AppData\Local\Temp\33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exeC:\Users\Admin\AppData\Local\Temp\33a402fc0cf6afdaeb3bd4491a6a8a9a58731a2d48de68af96b58eee1a034f0b.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a4dc09214b2c271e5c26947dbf095c1a
SHA1305d5ef53ec693db337e18f1f9e8a8c633aec6b7
SHA2560a49ba2f718f792983dc191df7d375ac8cd02e9a9afa94d1e9d3a058ff07aa2d
SHA5124421a5621b57be7d173e98eee914293b45dcb8653ab6c78d7f5677d0104ce69f63afe74688252db915a81ec22aa830913637857d983ba6f4a0cfa58a0788de55
-
Filesize
96KB
MD57e0918e73eda9924a1a16ddb88377619
SHA12ced193246157c7efd813c059b7839035044e868
SHA256c27f5963eff471a50a7b38d943aa74cbdcae5dcf25ae59d3031c7a2fade137cb
SHA512148c46db14b22d0d58dc65efbe6bba6924d928c8a19a546bccbdf78b465f848a508250c868815e858bf27c6ae2327bb430d7b4f8eec3bd4928b9be22240c8572
-
Filesize
96KB
MD5b8627a5133abce9aa88e725354e36492
SHA117357dadaf2d11262381a62c631ca85f91a50c87
SHA256bb0f60822a0e4431585dfca07d21f2f23681a12642c9847a10f54ab280907b8d
SHA5121357761ca6c7fb253508ad4835eae3884c1532e4de2cedff83f9c6a113d79b13877624e1c70eea477aa4a79cfba26ccc238fd42ecc6ba4458dfc605c1adb4940