Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 00:40
Static task
static1
Behavioral task
behavioral1
Sample
71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe
Resource
win7-20240903-en
General
-
Target
71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe
-
Size
96KB
-
MD5
62bb14a05c1ce9ce8dec97f5a134ad30
-
SHA1
1d5ac62685976da5a272a1aee97b47b56b7fef1e
-
SHA256
71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780
-
SHA512
a538e6ac4da02ea15dba077411a6f7a0a047d992453518eac50e4f7d06c191fe31270adafc66cb9ec01cce35a9989b1b6fbf8e207ec41956ddb191386ed2cff1
-
SSDEEP
1536:DnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:DGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2688 omsecor.exe 2648 omsecor.exe 536 omsecor.exe 1936 omsecor.exe 2320 omsecor.exe 1092 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2660 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 2660 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 2688 omsecor.exe 2648 omsecor.exe 2648 omsecor.exe 1936 omsecor.exe 1936 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2636 set thread context of 2660 2636 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 30 PID 2688 set thread context of 2648 2688 omsecor.exe 32 PID 536 set thread context of 1936 536 omsecor.exe 36 PID 2320 set thread context of 1092 2320 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2660 2636 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 30 PID 2636 wrote to memory of 2660 2636 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 30 PID 2636 wrote to memory of 2660 2636 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 30 PID 2636 wrote to memory of 2660 2636 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 30 PID 2636 wrote to memory of 2660 2636 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 30 PID 2636 wrote to memory of 2660 2636 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 30 PID 2660 wrote to memory of 2688 2660 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 31 PID 2660 wrote to memory of 2688 2660 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 31 PID 2660 wrote to memory of 2688 2660 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 31 PID 2660 wrote to memory of 2688 2660 71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe 31 PID 2688 wrote to memory of 2648 2688 omsecor.exe 32 PID 2688 wrote to memory of 2648 2688 omsecor.exe 32 PID 2688 wrote to memory of 2648 2688 omsecor.exe 32 PID 2688 wrote to memory of 2648 2688 omsecor.exe 32 PID 2688 wrote to memory of 2648 2688 omsecor.exe 32 PID 2688 wrote to memory of 2648 2688 omsecor.exe 32 PID 2648 wrote to memory of 536 2648 omsecor.exe 35 PID 2648 wrote to memory of 536 2648 omsecor.exe 35 PID 2648 wrote to memory of 536 2648 omsecor.exe 35 PID 2648 wrote to memory of 536 2648 omsecor.exe 35 PID 536 wrote to memory of 1936 536 omsecor.exe 36 PID 536 wrote to memory of 1936 536 omsecor.exe 36 PID 536 wrote to memory of 1936 536 omsecor.exe 36 PID 536 wrote to memory of 1936 536 omsecor.exe 36 PID 536 wrote to memory of 1936 536 omsecor.exe 36 PID 536 wrote to memory of 1936 536 omsecor.exe 36 PID 1936 wrote to memory of 2320 1936 omsecor.exe 37 PID 1936 wrote to memory of 2320 1936 omsecor.exe 37 PID 1936 wrote to memory of 2320 1936 omsecor.exe 37 PID 1936 wrote to memory of 2320 1936 omsecor.exe 37 PID 2320 wrote to memory of 1092 2320 omsecor.exe 38 PID 2320 wrote to memory of 1092 2320 omsecor.exe 38 PID 2320 wrote to memory of 1092 2320 omsecor.exe 38 PID 2320 wrote to memory of 1092 2320 omsecor.exe 38 PID 2320 wrote to memory of 1092 2320 omsecor.exe 38 PID 2320 wrote to memory of 1092 2320 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe"C:\Users\Admin\AppData\Local\Temp\71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exeC:\Users\Admin\AppData\Local\Temp\71f041c2226479cd85399a52ad3b825cc49b0e408f7a6c25f8322aca1474f780N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1092
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD50b3b42c52445e6795811414d69a3c890
SHA1ad79a0c72d7067bc25430436aa01ea0840f37065
SHA25600b0a4962bdef18c5088433a3ae26cbb03ccd6cb71d1ac3c69fb55d10353a17d
SHA5123ba115c99f847103afe2fcebdfe57db314b46953049c3b48b0cb077a9fa9005ed95260c9571fca4e0506e6c9f9fafb38503908fc7941f419f92c47bc97d41442
-
Filesize
96KB
MD52fc11d99fbd2a69de6c3f3cac38053d5
SHA1835b7515d442a970703b14f013d8d228d31ec0fa
SHA256e74d9d096dd0dc163f770321675b4a528eb060f2e2b8ec49e7cc2d7a63c6349e
SHA512de2cffa95add1a651215b34715953a635e2d6a76720f1df71b86d39308f4b7d8de09f82dd2b51e89dff65d9892c9269a42ecab6d34cb91ee497a5b7dbf643d21
-
Filesize
96KB
MD5ac496b508d38884bdba6e1a63bb8c72b
SHA1e7d45f3145bfc067923e435c615491952aace492
SHA256f9e10a4f8658682963d8b90e54b62f6f742122874dd59520dd17ec8d67397442
SHA512c9ca663d2618fa69a690cb7b7217d786a741d7247a7ffe8b98d7785a102025d671dba8f6a4f38c00089b7c011cf385ba8950b71d29641cdd9bdc319235723d33