Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 09:10
Static task
static1
Behavioral task
behavioral1
Sample
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
Resource
win7-20240903-en
General
-
Target
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
-
Size
96KB
-
MD5
c76ae9d599a9785e771abf4f29ceecfb
-
SHA1
5081943f7567b15af6bd451e27ce37b46b2b3908
-
SHA256
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47
-
SHA512
0e747cf070e24c6d8a509079f7dd33c3ec9175a6c3df13e038a30a7b90daf56c3b40497b1f0ec0970818ba56d76bf9df65c5ce86f0eeb71eb6514b1b41c31ad7
-
SSDEEP
1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:jGs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2464 omsecor.exe 2704 omsecor.exe 1176 omsecor.exe 1308 omsecor.exe 1868 omsecor.exe 1668 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 1196 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 2464 omsecor.exe 2704 omsecor.exe 2704 omsecor.exe 1308 omsecor.exe 1308 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2528 set thread context of 1196 2528 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 2464 set thread context of 2704 2464 omsecor.exe 32 PID 1176 set thread context of 1308 1176 omsecor.exe 36 PID 1868 set thread context of 1668 1868 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1196 2528 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 2528 wrote to memory of 1196 2528 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 2528 wrote to memory of 1196 2528 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 2528 wrote to memory of 1196 2528 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 2528 wrote to memory of 1196 2528 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 2528 wrote to memory of 1196 2528 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 30 PID 1196 wrote to memory of 2464 1196 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 31 PID 1196 wrote to memory of 2464 1196 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 31 PID 1196 wrote to memory of 2464 1196 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 31 PID 1196 wrote to memory of 2464 1196 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 31 PID 2464 wrote to memory of 2704 2464 omsecor.exe 32 PID 2464 wrote to memory of 2704 2464 omsecor.exe 32 PID 2464 wrote to memory of 2704 2464 omsecor.exe 32 PID 2464 wrote to memory of 2704 2464 omsecor.exe 32 PID 2464 wrote to memory of 2704 2464 omsecor.exe 32 PID 2464 wrote to memory of 2704 2464 omsecor.exe 32 PID 2704 wrote to memory of 1176 2704 omsecor.exe 35 PID 2704 wrote to memory of 1176 2704 omsecor.exe 35 PID 2704 wrote to memory of 1176 2704 omsecor.exe 35 PID 2704 wrote to memory of 1176 2704 omsecor.exe 35 PID 1176 wrote to memory of 1308 1176 omsecor.exe 36 PID 1176 wrote to memory of 1308 1176 omsecor.exe 36 PID 1176 wrote to memory of 1308 1176 omsecor.exe 36 PID 1176 wrote to memory of 1308 1176 omsecor.exe 36 PID 1176 wrote to memory of 1308 1176 omsecor.exe 36 PID 1176 wrote to memory of 1308 1176 omsecor.exe 36 PID 1308 wrote to memory of 1868 1308 omsecor.exe 37 PID 1308 wrote to memory of 1868 1308 omsecor.exe 37 PID 1308 wrote to memory of 1868 1308 omsecor.exe 37 PID 1308 wrote to memory of 1868 1308 omsecor.exe 37 PID 1868 wrote to memory of 1668 1868 omsecor.exe 38 PID 1868 wrote to memory of 1668 1868 omsecor.exe 38 PID 1868 wrote to memory of 1668 1868 omsecor.exe 38 PID 1868 wrote to memory of 1668 1868 omsecor.exe 38 PID 1868 wrote to memory of 1668 1868 omsecor.exe 38 PID 1868 wrote to memory of 1668 1868 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe"C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exeC:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ff0a66d0ab28d44b16d0f46ac6d21dce
SHA16fce2a89f4e37ba34a24902f12450ef1a08c81bf
SHA2567f793f841df69ae717b8d3693bfcc430fd9ed036b0adf08ad80b2cfe5ab0f081
SHA512ec63375dc7584e774f5b95b25a12ecae1970126579e98b8f82ffded598edb06f83d76312658b79d72a7e7cd9ff0d68427c9ab7f8a7301ad33925c99d7c96d1c9
-
Filesize
96KB
MD55955787a97c9871442009adcd29e371f
SHA1f53d17a51a190d300a66b1a2a926e91e86455af9
SHA25645a362638209aeceaf4c7628578fa45a72d97faa6bcae52455cb3d2cea0c5457
SHA51222ed0c747b94897ccbc21fb8c5e95916b403f13627e4abe4d6d477e3adc8235b97c95426add1c03a04603f867b9caae6983bd351e470c2a631c87e0ef4431045
-
Filesize
96KB
MD532375bf48751a09224a7ead784ce155f
SHA1e169aab65d153d6ef6769ed8fb627d72831259d3
SHA256bf2f85ee2da9439fa1aa186eac2b86d6279c618e2bf83d3355c97564958a506e
SHA512cea2e37dc829ba0bc4d27099bb54a5090478f4ba3285fc116305945d5409daa3627e4391b4cf63e9cf4614b57364840d6a2304633520838d83b47b7c61ffbb7a