Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 21:20
Static task
static1
Behavioral task
behavioral1
Sample
a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe
Resource
win7-20241023-en
General
-
Target
a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe
-
Size
134KB
-
MD5
f4be90352975039dc08cb4cfff1ab390
-
SHA1
e9e7d4d0d1f8da90d7748a18b21a6d2a579d9f2b
-
SHA256
a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203
-
SHA512
5bb9afc5872978bcfbdecf0997e54d1b8a091e3941e83a59164d4124d7c7ee48b68ac3814eb336c5226761f35965ecf413ec0d51a6d8a2c173c297b3db85fc2f
-
SSDEEP
1536:MDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:yiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1272 omsecor.exe 2172 omsecor.exe 1928 omsecor.exe 1448 omsecor.exe 1764 omsecor.exe 2128 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1204 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 1204 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 1272 omsecor.exe 2172 omsecor.exe 2172 omsecor.exe 1448 omsecor.exe 1448 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1268 set thread context of 1204 1268 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 31 PID 1272 set thread context of 2172 1272 omsecor.exe 33 PID 1928 set thread context of 1448 1928 omsecor.exe 37 PID 1764 set thread context of 2128 1764 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1204 1268 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 31 PID 1268 wrote to memory of 1204 1268 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 31 PID 1268 wrote to memory of 1204 1268 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 31 PID 1268 wrote to memory of 1204 1268 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 31 PID 1268 wrote to memory of 1204 1268 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 31 PID 1268 wrote to memory of 1204 1268 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 31 PID 1204 wrote to memory of 1272 1204 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 32 PID 1204 wrote to memory of 1272 1204 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 32 PID 1204 wrote to memory of 1272 1204 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 32 PID 1204 wrote to memory of 1272 1204 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 32 PID 1272 wrote to memory of 2172 1272 omsecor.exe 33 PID 1272 wrote to memory of 2172 1272 omsecor.exe 33 PID 1272 wrote to memory of 2172 1272 omsecor.exe 33 PID 1272 wrote to memory of 2172 1272 omsecor.exe 33 PID 1272 wrote to memory of 2172 1272 omsecor.exe 33 PID 1272 wrote to memory of 2172 1272 omsecor.exe 33 PID 2172 wrote to memory of 1928 2172 omsecor.exe 36 PID 2172 wrote to memory of 1928 2172 omsecor.exe 36 PID 2172 wrote to memory of 1928 2172 omsecor.exe 36 PID 2172 wrote to memory of 1928 2172 omsecor.exe 36 PID 1928 wrote to memory of 1448 1928 omsecor.exe 37 PID 1928 wrote to memory of 1448 1928 omsecor.exe 37 PID 1928 wrote to memory of 1448 1928 omsecor.exe 37 PID 1928 wrote to memory of 1448 1928 omsecor.exe 37 PID 1928 wrote to memory of 1448 1928 omsecor.exe 37 PID 1928 wrote to memory of 1448 1928 omsecor.exe 37 PID 1448 wrote to memory of 1764 1448 omsecor.exe 38 PID 1448 wrote to memory of 1764 1448 omsecor.exe 38 PID 1448 wrote to memory of 1764 1448 omsecor.exe 38 PID 1448 wrote to memory of 1764 1448 omsecor.exe 38 PID 1764 wrote to memory of 2128 1764 omsecor.exe 39 PID 1764 wrote to memory of 2128 1764 omsecor.exe 39 PID 1764 wrote to memory of 2128 1764 omsecor.exe 39 PID 1764 wrote to memory of 2128 1764 omsecor.exe 39 PID 1764 wrote to memory of 2128 1764 omsecor.exe 39 PID 1764 wrote to memory of 2128 1764 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe"C:\Users\Admin\AppData\Local\Temp\a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exeC:\Users\Admin\AppData\Local\Temp\a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD547ea24d32de825648a86967dd4c2b7f2
SHA16d6a59b5630a39fc8dea1bb37169e237ccf19802
SHA2561a4455972b1f0c6a3b893c2650be4f66bea2ee3023a08994d3a5eb01ff589fe4
SHA512308a1c734176ff6d19e7c14e63af6f08458cb2a64ffa0c37709877ff1be38b7dc6fff157b9ed9728623e344707d96bc791e8dcf9878327b5dc40b8754d0c8f3e
-
Filesize
134KB
MD5e19dd94e2d8aa586a1398fac07dee48e
SHA1d51b394d9541c1e406dc50c328d9a2d0b5f1916d
SHA256d18d6d93f7c92932fd76f6061edcbf78af56e2a492ca152619e024446664e558
SHA512c16b58d1f9f6808666b32309c1c41ef3afb7f2fccbfe3c5f7bd5a4ff8cfba549c9d5d58c5dbe0271cb8c2e2ce2e3d7aad9eb149e003b806b63015d52af4d4f58
-
Filesize
134KB
MD5237ebd15c1275362cce5aff75c69ceee
SHA1761b9d5db6a75a4357dcdb9c94123994b2e57b41
SHA256e5849be6141e9184ed52e98962ded107bb2d836e9d345a192e10e9448bb806fb
SHA5121dd00cd212e4f6f9c9b870adff395d64c3936bebb0bf7a49f108a545f15d19c879a038901519b46dac5f84b6960f4928bb953b6d9780d87ba6c2ab3e178621a7