Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 09:05
Static task
static1
Behavioral task
behavioral1
Sample
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
Resource
win7-20240903-en
General
-
Target
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
-
Size
96KB
-
MD5
c76ae9d599a9785e771abf4f29ceecfb
-
SHA1
5081943f7567b15af6bd451e27ce37b46b2b3908
-
SHA256
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47
-
SHA512
0e747cf070e24c6d8a509079f7dd33c3ec9175a6c3df13e038a30a7b90daf56c3b40497b1f0ec0970818ba56d76bf9df65c5ce86f0eeb71eb6514b1b41c31ad7
-
SSDEEP
1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:jGs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2728 omsecor.exe 2516 omsecor.exe 772 omsecor.exe 1452 omsecor.exe 1392 omsecor.exe 2848 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3064 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 3064 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 2728 omsecor.exe 2516 omsecor.exe 2516 omsecor.exe 1452 omsecor.exe 1452 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3040 set thread context of 3064 3040 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 2728 set thread context of 2516 2728 omsecor.exe 32 PID 772 set thread context of 1452 772 omsecor.exe 35 PID 1392 set thread context of 2848 1392 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3064 3040 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 3040 wrote to memory of 3064 3040 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 3040 wrote to memory of 3064 3040 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 3040 wrote to memory of 3064 3040 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 3040 wrote to memory of 3064 3040 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 3040 wrote to memory of 3064 3040 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 3064 wrote to memory of 2728 3064 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 31 PID 3064 wrote to memory of 2728 3064 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 31 PID 3064 wrote to memory of 2728 3064 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 31 PID 3064 wrote to memory of 2728 3064 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 31 PID 2728 wrote to memory of 2516 2728 omsecor.exe 32 PID 2728 wrote to memory of 2516 2728 omsecor.exe 32 PID 2728 wrote to memory of 2516 2728 omsecor.exe 32 PID 2728 wrote to memory of 2516 2728 omsecor.exe 32 PID 2728 wrote to memory of 2516 2728 omsecor.exe 32 PID 2728 wrote to memory of 2516 2728 omsecor.exe 32 PID 2516 wrote to memory of 772 2516 omsecor.exe 34 PID 2516 wrote to memory of 772 2516 omsecor.exe 34 PID 2516 wrote to memory of 772 2516 omsecor.exe 34 PID 2516 wrote to memory of 772 2516 omsecor.exe 34 PID 772 wrote to memory of 1452 772 omsecor.exe 35 PID 772 wrote to memory of 1452 772 omsecor.exe 35 PID 772 wrote to memory of 1452 772 omsecor.exe 35 PID 772 wrote to memory of 1452 772 omsecor.exe 35 PID 772 wrote to memory of 1452 772 omsecor.exe 35 PID 772 wrote to memory of 1452 772 omsecor.exe 35 PID 1452 wrote to memory of 1392 1452 omsecor.exe 36 PID 1452 wrote to memory of 1392 1452 omsecor.exe 36 PID 1452 wrote to memory of 1392 1452 omsecor.exe 36 PID 1452 wrote to memory of 1392 1452 omsecor.exe 36 PID 1392 wrote to memory of 2848 1392 omsecor.exe 37 PID 1392 wrote to memory of 2848 1392 omsecor.exe 37 PID 1392 wrote to memory of 2848 1392 omsecor.exe 37 PID 1392 wrote to memory of 2848 1392 omsecor.exe 37 PID 1392 wrote to memory of 2848 1392 omsecor.exe 37 PID 1392 wrote to memory of 2848 1392 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe"C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exeC:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ff0a66d0ab28d44b16d0f46ac6d21dce
SHA16fce2a89f4e37ba34a24902f12450ef1a08c81bf
SHA2567f793f841df69ae717b8d3693bfcc430fd9ed036b0adf08ad80b2cfe5ab0f081
SHA512ec63375dc7584e774f5b95b25a12ecae1970126579e98b8f82ffded598edb06f83d76312658b79d72a7e7cd9ff0d68427c9ab7f8a7301ad33925c99d7c96d1c9
-
Filesize
96KB
MD5f644124b513b78fe9ff4fd48ea666b14
SHA1ac6d724c78dfa8081022b721e4ab6a344fe993a4
SHA256555b6fead09612e528e31d1f9fa059ab9d6aedc003de6339f0ed365821b8c1e3
SHA512d20f36d9c6b220394eac98f84008c1d97f8ef957edc384b00f6bff295f4660d03c0cf9831632380e34f9068605803043bdc63265344ffc21994686bdb022c896
-
Filesize
96KB
MD574b91c69a7f07652cc1d9b022c7c25f9
SHA10c50af2d100c3a351e47368d553fe711def7602b
SHA2563b0c2a534efdbd709d631c994364c49ce50527623117678d06f129faf16758c5
SHA512319986aca9a546a6e1c43c8fcced01087310698b835e374a2d4491de5f535d8b575b6ccd027b7098605b2a844fa515643cd7afd4b8c8a6541eabf80dc3b6c6f1