Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 13:18
Static task
static1
Behavioral task
behavioral1
Sample
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe
Resource
win7-20240708-en
General
-
Target
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe
-
Size
96KB
-
MD5
640036c324b6763e3397bdc9d5065426
-
SHA1
cb5ef36508ef3ecd646a80375141bc7379677a7e
-
SHA256
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df
-
SHA512
e75a5e9d79d5df89f113a4d2ac5fba0d16dc201944e4dd0a6d440f4b569512dad11eaf57382569691aa307e8d85ce4acaf67c379a8524f20aa0ff319ee06cc35
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxp:MGs8cd8eXlYairZYqMddH13p
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1800 omsecor.exe 2076 omsecor.exe 2308 omsecor.exe 1380 omsecor.exe 852 omsecor.exe 2860 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2352 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 2352 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 1800 omsecor.exe 2076 omsecor.exe 2076 omsecor.exe 1380 omsecor.exe 1380 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2988 set thread context of 2352 2988 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 1800 set thread context of 2076 1800 omsecor.exe 32 PID 2308 set thread context of 1380 2308 omsecor.exe 36 PID 852 set thread context of 2860 852 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2352 2988 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2988 wrote to memory of 2352 2988 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2988 wrote to memory of 2352 2988 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2988 wrote to memory of 2352 2988 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2988 wrote to memory of 2352 2988 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2988 wrote to memory of 2352 2988 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 30 PID 2352 wrote to memory of 1800 2352 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 31 PID 2352 wrote to memory of 1800 2352 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 31 PID 2352 wrote to memory of 1800 2352 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 31 PID 2352 wrote to memory of 1800 2352 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 31 PID 1800 wrote to memory of 2076 1800 omsecor.exe 32 PID 1800 wrote to memory of 2076 1800 omsecor.exe 32 PID 1800 wrote to memory of 2076 1800 omsecor.exe 32 PID 1800 wrote to memory of 2076 1800 omsecor.exe 32 PID 1800 wrote to memory of 2076 1800 omsecor.exe 32 PID 1800 wrote to memory of 2076 1800 omsecor.exe 32 PID 2076 wrote to memory of 2308 2076 omsecor.exe 35 PID 2076 wrote to memory of 2308 2076 omsecor.exe 35 PID 2076 wrote to memory of 2308 2076 omsecor.exe 35 PID 2076 wrote to memory of 2308 2076 omsecor.exe 35 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 1380 wrote to memory of 852 1380 omsecor.exe 37 PID 1380 wrote to memory of 852 1380 omsecor.exe 37 PID 1380 wrote to memory of 852 1380 omsecor.exe 37 PID 1380 wrote to memory of 852 1380 omsecor.exe 37 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe"C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exeC:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5396dcf79429d24a795687d8bc6bbf3d3
SHA1822b4e76c6b1d67998a2846d8d9f0f8a3e898905
SHA25603333317fec29ef3fa3de254256eaad62365ce7b7fa044eb367a9448eabb8fd1
SHA51296133042e16ff9b2716e878330aa587e64429fec78e0150fa7edd9ed3c1fea02f3bc6afe761b13f412e579dde65d8971b846323e8bcaae8961dafaf11aef6578
-
Filesize
96KB
MD54dc863b9d2294e66524ba100e9b20bac
SHA14e008c8cd593260ade27326ecee15e71452d4b7d
SHA2563ac475175e5af3bfe208200c1f0e0b155e9b27db5e39de68506aebc786b9f76e
SHA5126c895dd858744021aebce43032d5c0a912769318d4f6b0f96a9cd6a01f901c4093937e4ccb2c01c536420a039e8f49bf86b2fdbd0e3c4ee13c0bffeade7cdfd4
-
Filesize
96KB
MD5d8bd13ea613770f6573844ab5f46e2e6
SHA1c530ac7ff0157c47d7eef9bbfeffe5359bdadd3a
SHA2564b0706fb931709fa30dfd8ebdad6c4af9b7584c4513c77b0578078f1e79665c6
SHA5125a3361b5bcd555ca94fe3f3b1c0fc936751e38e2e3f13808433f5f4c3be17e3738fc26f55c5c7acf9fdba56b853b3bed92cd9adfe2a558d96a70f7fbede43f72