Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 00:24
Static task
static1
Behavioral task
behavioral1
Sample
1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe
Resource
win7-20240903-en
General
-
Target
1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe
-
Size
96KB
-
MD5
06f9986e4fd70ec310d913a22795d5c4
-
SHA1
c0e06f7d1584e7f67647830aabf325511ec17e14
-
SHA256
1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98
-
SHA512
26d793ae3715a2c9efac88fe48238213a2b42ebbf72e5422504318e8a5379b52f6d4467ef113a83ac8f5e341443303c3d6776842cf8c55efd770ecd96368913a
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:TGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 780 omsecor.exe 2816 omsecor.exe 2108 omsecor.exe 2404 omsecor.exe 2536 omsecor.exe 2148 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2772 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 2772 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 780 omsecor.exe 2816 omsecor.exe 2816 omsecor.exe 2404 omsecor.exe 2404 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2764 set thread context of 2772 2764 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 30 PID 780 set thread context of 2816 780 omsecor.exe 32 PID 2108 set thread context of 2404 2108 omsecor.exe 36 PID 2536 set thread context of 2148 2536 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2772 2764 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 30 PID 2764 wrote to memory of 2772 2764 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 30 PID 2764 wrote to memory of 2772 2764 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 30 PID 2764 wrote to memory of 2772 2764 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 30 PID 2764 wrote to memory of 2772 2764 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 30 PID 2764 wrote to memory of 2772 2764 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 30 PID 2772 wrote to memory of 780 2772 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 31 PID 2772 wrote to memory of 780 2772 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 31 PID 2772 wrote to memory of 780 2772 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 31 PID 2772 wrote to memory of 780 2772 1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe 31 PID 780 wrote to memory of 2816 780 omsecor.exe 32 PID 780 wrote to memory of 2816 780 omsecor.exe 32 PID 780 wrote to memory of 2816 780 omsecor.exe 32 PID 780 wrote to memory of 2816 780 omsecor.exe 32 PID 780 wrote to memory of 2816 780 omsecor.exe 32 PID 780 wrote to memory of 2816 780 omsecor.exe 32 PID 2816 wrote to memory of 2108 2816 omsecor.exe 35 PID 2816 wrote to memory of 2108 2816 omsecor.exe 35 PID 2816 wrote to memory of 2108 2816 omsecor.exe 35 PID 2816 wrote to memory of 2108 2816 omsecor.exe 35 PID 2108 wrote to memory of 2404 2108 omsecor.exe 36 PID 2108 wrote to memory of 2404 2108 omsecor.exe 36 PID 2108 wrote to memory of 2404 2108 omsecor.exe 36 PID 2108 wrote to memory of 2404 2108 omsecor.exe 36 PID 2108 wrote to memory of 2404 2108 omsecor.exe 36 PID 2108 wrote to memory of 2404 2108 omsecor.exe 36 PID 2404 wrote to memory of 2536 2404 omsecor.exe 37 PID 2404 wrote to memory of 2536 2404 omsecor.exe 37 PID 2404 wrote to memory of 2536 2404 omsecor.exe 37 PID 2404 wrote to memory of 2536 2404 omsecor.exe 37 PID 2536 wrote to memory of 2148 2536 omsecor.exe 38 PID 2536 wrote to memory of 2148 2536 omsecor.exe 38 PID 2536 wrote to memory of 2148 2536 omsecor.exe 38 PID 2536 wrote to memory of 2148 2536 omsecor.exe 38 PID 2536 wrote to memory of 2148 2536 omsecor.exe 38 PID 2536 wrote to memory of 2148 2536 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe"C:\Users\Admin\AppData\Local\Temp\1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exeC:\Users\Admin\AppData\Local\Temp\1afd01860aa4a3311cb9e33f8847d275d4f71866f9766c328c2fc10466e55d98.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d11dcc14dc9b76c4133db787467b11e1
SHA15bd4c3c592fcdf9aed6a943ee7d776da2188b93a
SHA25634a9021c951262ec23a9776c4d4ba5bc11b335a47a491d3fe659ac7d416679c1
SHA5121f6c27d02cad38d4246c8cf8dacdb11f3d75d2b47cc7ff7711cc8ae6287853e847f074502cd7c1355edd33a787e09574deb911590f64b40026ad25e86d49144f
-
Filesize
96KB
MD5fba583fcaa0a94dd36d33d0748cfe3d5
SHA1b34aef2106b17a93596168becf8245efc8789cc4
SHA25665dd13f005fd957a6cd5bc34d3fa6ca2d99c76a24dc09114a0c40c83b6d1b475
SHA5127e626af31fbfbaeba201665e56d21b1c8fab4216c3386325db0c012cdb96ea266a5df18c34f12a724a43e0b38c34d97e8dc3d94b746f2d5756870f586ebad7d7
-
Filesize
96KB
MD5c79204ecdab504f40c444e6e471a6cc1
SHA15b70f8554d64e18bf4245e821b92811b69ab03ba
SHA256989f474772218b49b3a3f0cccd63058cddab89defae17c798ad23040334c57fd
SHA5125e851002ed42959f26488a3e6aee351486fae8540a3fbcfa0bcb031fb97b48aa9140078f6c33eafc5948ffecacd1ec316a7605897b25d7f4b220e1f45ab5c2e5