Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 13:12
Static task
static1
Behavioral task
behavioral1
Sample
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe
Resource
win7-20241023-en
General
-
Target
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe
-
Size
96KB
-
MD5
640036c324b6763e3397bdc9d5065426
-
SHA1
cb5ef36508ef3ecd646a80375141bc7379677a7e
-
SHA256
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df
-
SHA512
e75a5e9d79d5df89f113a4d2ac5fba0d16dc201944e4dd0a6d440f4b569512dad11eaf57382569691aa307e8d85ce4acaf67c379a8524f20aa0ff319ee06cc35
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxp:MGs8cd8eXlYairZYqMddH13p
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1648 omsecor.exe 2380 omsecor.exe 3056 omsecor.exe 532 omsecor.exe 2360 omsecor.exe 1940 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2408 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 2408 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 1648 omsecor.exe 2380 omsecor.exe 2380 omsecor.exe 532 omsecor.exe 532 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2412 set thread context of 2408 2412 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 1648 set thread context of 2380 1648 omsecor.exe 32 PID 3056 set thread context of 532 3056 omsecor.exe 36 PID 2360 set thread context of 1940 2360 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2408 2412 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2412 wrote to memory of 2408 2412 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2412 wrote to memory of 2408 2412 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2412 wrote to memory of 2408 2412 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2412 wrote to memory of 2408 2412 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2412 wrote to memory of 2408 2412 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2408 wrote to memory of 1648 2408 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 31 PID 2408 wrote to memory of 1648 2408 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 31 PID 2408 wrote to memory of 1648 2408 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 31 PID 2408 wrote to memory of 1648 2408 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 31 PID 1648 wrote to memory of 2380 1648 omsecor.exe 32 PID 1648 wrote to memory of 2380 1648 omsecor.exe 32 PID 1648 wrote to memory of 2380 1648 omsecor.exe 32 PID 1648 wrote to memory of 2380 1648 omsecor.exe 32 PID 1648 wrote to memory of 2380 1648 omsecor.exe 32 PID 1648 wrote to memory of 2380 1648 omsecor.exe 32 PID 2380 wrote to memory of 3056 2380 omsecor.exe 35 PID 2380 wrote to memory of 3056 2380 omsecor.exe 35 PID 2380 wrote to memory of 3056 2380 omsecor.exe 35 PID 2380 wrote to memory of 3056 2380 omsecor.exe 35 PID 3056 wrote to memory of 532 3056 omsecor.exe 36 PID 3056 wrote to memory of 532 3056 omsecor.exe 36 PID 3056 wrote to memory of 532 3056 omsecor.exe 36 PID 3056 wrote to memory of 532 3056 omsecor.exe 36 PID 3056 wrote to memory of 532 3056 omsecor.exe 36 PID 3056 wrote to memory of 532 3056 omsecor.exe 36 PID 532 wrote to memory of 2360 532 omsecor.exe 37 PID 532 wrote to memory of 2360 532 omsecor.exe 37 PID 532 wrote to memory of 2360 532 omsecor.exe 37 PID 532 wrote to memory of 2360 532 omsecor.exe 37 PID 2360 wrote to memory of 1940 2360 omsecor.exe 38 PID 2360 wrote to memory of 1940 2360 omsecor.exe 38 PID 2360 wrote to memory of 1940 2360 omsecor.exe 38 PID 2360 wrote to memory of 1940 2360 omsecor.exe 38 PID 2360 wrote to memory of 1940 2360 omsecor.exe 38 PID 2360 wrote to memory of 1940 2360 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe"C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exeC:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5396dcf79429d24a795687d8bc6bbf3d3
SHA1822b4e76c6b1d67998a2846d8d9f0f8a3e898905
SHA25603333317fec29ef3fa3de254256eaad62365ce7b7fa044eb367a9448eabb8fd1
SHA51296133042e16ff9b2716e878330aa587e64429fec78e0150fa7edd9ed3c1fea02f3bc6afe761b13f412e579dde65d8971b846323e8bcaae8961dafaf11aef6578
-
Filesize
96KB
MD53a4a439d975861cbb08fd17cad436354
SHA18248365ed7ba30e13c9024b47e310a3c94d5de9c
SHA256c3d88922e13437f3735a0e8867ff86adfc8bae6be1d366e9864058e9f4e043a6
SHA5124faa4408ea4d871d63114be51cdcb60eb92e6cd03f01834d063b3dea2ce177f86b418004a642cc96ccc5c2159e7f9968f28710c6b95b38111d3bb07dc9d541c9
-
Filesize
96KB
MD52afea5a170f40af4481f8e7e694265f8
SHA1a7888e95fadc857a424c9071c0a62414a440f57a
SHA25667654c6059d023d18fedbb83db1612df549198f72fa908885c0cc9e9d99e75b5
SHA512118c76258d3911d5dfa0e2f21f678be2042fb74609cc1dab219cf0cee3e4d30b7dcaf58dacfc22e8fe51f55d30b780ab1560ae0c1e3cf2af734a539ec372504b