Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 03:36
Static task
static1
Behavioral task
behavioral1
Sample
95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe
Resource
win7-20240729-en
General
-
Target
95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe
-
Size
134KB
-
MD5
40e2396dc161bed1a4864ebe78e50320
-
SHA1
242b7e4f41850080d11d81902cbbea32cf078414
-
SHA256
95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488c
-
SHA512
71188890e9856eac2275421c6d795eb40fbc321b511ad27c5c1ae51ce5aea54963d03c315dc9fa2203b4cf41975e7a133e867a5f2e3dc796340b5b6fd00c1008
-
SSDEEP
1536:aDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiH:8iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2000 omsecor.exe 2412 omsecor.exe 2604 omsecor.exe 1828 omsecor.exe 1656 omsecor.exe 844 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3016 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 3016 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 2000 omsecor.exe 2412 omsecor.exe 2412 omsecor.exe 1828 omsecor.exe 1828 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2136 set thread context of 3016 2136 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 30 PID 2000 set thread context of 2412 2000 omsecor.exe 32 PID 2604 set thread context of 1828 2604 omsecor.exe 36 PID 1656 set thread context of 844 1656 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2136 wrote to memory of 3016 2136 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 30 PID 2136 wrote to memory of 3016 2136 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 30 PID 2136 wrote to memory of 3016 2136 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 30 PID 2136 wrote to memory of 3016 2136 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 30 PID 2136 wrote to memory of 3016 2136 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 30 PID 2136 wrote to memory of 3016 2136 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 30 PID 3016 wrote to memory of 2000 3016 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 31 PID 3016 wrote to memory of 2000 3016 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 31 PID 3016 wrote to memory of 2000 3016 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 31 PID 3016 wrote to memory of 2000 3016 95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe 31 PID 2000 wrote to memory of 2412 2000 omsecor.exe 32 PID 2000 wrote to memory of 2412 2000 omsecor.exe 32 PID 2000 wrote to memory of 2412 2000 omsecor.exe 32 PID 2000 wrote to memory of 2412 2000 omsecor.exe 32 PID 2000 wrote to memory of 2412 2000 omsecor.exe 32 PID 2000 wrote to memory of 2412 2000 omsecor.exe 32 PID 2412 wrote to memory of 2604 2412 omsecor.exe 35 PID 2412 wrote to memory of 2604 2412 omsecor.exe 35 PID 2412 wrote to memory of 2604 2412 omsecor.exe 35 PID 2412 wrote to memory of 2604 2412 omsecor.exe 35 PID 2604 wrote to memory of 1828 2604 omsecor.exe 36 PID 2604 wrote to memory of 1828 2604 omsecor.exe 36 PID 2604 wrote to memory of 1828 2604 omsecor.exe 36 PID 2604 wrote to memory of 1828 2604 omsecor.exe 36 PID 2604 wrote to memory of 1828 2604 omsecor.exe 36 PID 2604 wrote to memory of 1828 2604 omsecor.exe 36 PID 1828 wrote to memory of 1656 1828 omsecor.exe 37 PID 1828 wrote to memory of 1656 1828 omsecor.exe 37 PID 1828 wrote to memory of 1656 1828 omsecor.exe 37 PID 1828 wrote to memory of 1656 1828 omsecor.exe 37 PID 1656 wrote to memory of 844 1656 omsecor.exe 38 PID 1656 wrote to memory of 844 1656 omsecor.exe 38 PID 1656 wrote to memory of 844 1656 omsecor.exe 38 PID 1656 wrote to memory of 844 1656 omsecor.exe 38 PID 1656 wrote to memory of 844 1656 omsecor.exe 38 PID 1656 wrote to memory of 844 1656 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe"C:\Users\Admin\AppData\Local\Temp\95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exeC:\Users\Admin\AppData\Local\Temp\95c7ba45a94a98713c24bd664cfb4c5e4f6c3daf681530799f1372161ada488cN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:844
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD59b4ed228babe75ddc6fa28e6722ed4fe
SHA11156039cb072d47fe38109e8916ba3e04b26cd38
SHA256c69e950b908a7aa1850414c1408f7819464ebf8efcc89ec9e6a53d376b6196fa
SHA5121bb34c19add3c13a6f944b4a024c3f84fb8ab7e8f5a1bfc23432fd37b2da7c8126d957e50f476c13cb1f9bdc817b123710e78b796d236bbf3991b7aa2bbfa1e1
-
Filesize
134KB
MD5d17f3de7e6748c7c73117da1066dc6ec
SHA1024fc827fe0587e19630fa7466ba7b21a53f6239
SHA2565f0b9a9026c0c7b93ad9e599ca9499351c9e0ffa69314b72d82f3504426da729
SHA5127cfd7903a8744eab6d2cfa8c1e201f4388e4bd8e0f1169e586ab3ff531f03622b9dbc2ca11d436dc4e04f8b60a2e8aebd49452ba8f83843be4ac1009d4424042
-
Filesize
134KB
MD5476e31fcb071644fd5fd3ac8bc058161
SHA1cfd2dcffad9f5e75420615d6950bdb820ebc376b
SHA2568ebeb9c99551c98131b6d792fc67841634f5f422cbd7d8aa3d3d93562406a503
SHA5126ed26ba182e511903021623cc350855df06cd5fe0f90c7da36b74b64177ccc967289ea29a889182e177fc0cc226ac7c311200e87e9cad48f249569d6aa6b6afd