Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 02:48
Static task
static1
Behavioral task
behavioral1
Sample
62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe
Resource
win7-20240903-en
General
-
Target
62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe
-
Size
134KB
-
MD5
51dad8da4937b0553e89916281ade2a0
-
SHA1
750688fe6ba6efd508f34275a8a1584d20ff97e8
-
SHA256
62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33
-
SHA512
6fb2f41cf9db6176f47430c190e08bcacd9dae64e5865ba062e703fda17003ee22f45b96200a265fec6e16ad311ce051728bb9118e2ca62842127ce04c4ca677
-
SSDEEP
1536:cDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:CiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3020 omsecor.exe 1788 omsecor.exe 540 omsecor.exe 2032 omsecor.exe 2796 omsecor.exe 272 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2932 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 2932 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 3020 omsecor.exe 1788 omsecor.exe 1788 omsecor.exe 2032 omsecor.exe 2032 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2316 set thread context of 2932 2316 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 31 PID 3020 set thread context of 1788 3020 omsecor.exe 33 PID 540 set thread context of 2032 540 omsecor.exe 37 PID 2796 set thread context of 272 2796 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2932 2316 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 31 PID 2316 wrote to memory of 2932 2316 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 31 PID 2316 wrote to memory of 2932 2316 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 31 PID 2316 wrote to memory of 2932 2316 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 31 PID 2316 wrote to memory of 2932 2316 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 31 PID 2316 wrote to memory of 2932 2316 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 31 PID 2932 wrote to memory of 3020 2932 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 32 PID 2932 wrote to memory of 3020 2932 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 32 PID 2932 wrote to memory of 3020 2932 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 32 PID 2932 wrote to memory of 3020 2932 62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe 32 PID 3020 wrote to memory of 1788 3020 omsecor.exe 33 PID 3020 wrote to memory of 1788 3020 omsecor.exe 33 PID 3020 wrote to memory of 1788 3020 omsecor.exe 33 PID 3020 wrote to memory of 1788 3020 omsecor.exe 33 PID 3020 wrote to memory of 1788 3020 omsecor.exe 33 PID 3020 wrote to memory of 1788 3020 omsecor.exe 33 PID 1788 wrote to memory of 540 1788 omsecor.exe 36 PID 1788 wrote to memory of 540 1788 omsecor.exe 36 PID 1788 wrote to memory of 540 1788 omsecor.exe 36 PID 1788 wrote to memory of 540 1788 omsecor.exe 36 PID 540 wrote to memory of 2032 540 omsecor.exe 37 PID 540 wrote to memory of 2032 540 omsecor.exe 37 PID 540 wrote to memory of 2032 540 omsecor.exe 37 PID 540 wrote to memory of 2032 540 omsecor.exe 37 PID 540 wrote to memory of 2032 540 omsecor.exe 37 PID 540 wrote to memory of 2032 540 omsecor.exe 37 PID 2032 wrote to memory of 2796 2032 omsecor.exe 38 PID 2032 wrote to memory of 2796 2032 omsecor.exe 38 PID 2032 wrote to memory of 2796 2032 omsecor.exe 38 PID 2032 wrote to memory of 2796 2032 omsecor.exe 38 PID 2796 wrote to memory of 272 2796 omsecor.exe 39 PID 2796 wrote to memory of 272 2796 omsecor.exe 39 PID 2796 wrote to memory of 272 2796 omsecor.exe 39 PID 2796 wrote to memory of 272 2796 omsecor.exe 39 PID 2796 wrote to memory of 272 2796 omsecor.exe 39 PID 2796 wrote to memory of 272 2796 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe"C:\Users\Admin\AppData\Local\Temp\62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exeC:\Users\Admin\AppData\Local\Temp\62ac3574bd12cc74abfd717ae484ff082cbf287eb5c3ced887bd5f5abc22fe33N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:272
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5334fb6c9dd7c59479d87391e23ebb955
SHA197b593e659f225767742a4f3eea7fb3698c3e48e
SHA25628f651661348768852a846f00be5a451a6ddbd62e4217fadccd704daa159192c
SHA512759bc98c6559a937438ca3150de5375398e4703c77793153dce5c10216e54ac83ceefa1f9e7bf4399ddc3ed04407f336f471fce40b70a36386ad9d65c1ee2e91
-
Filesize
134KB
MD5191f3c5b16b76f0fcf3b23d5f77b1250
SHA1bf5c7402e87ecfdf744953664e3d02debe8ce789
SHA256a6ef84b7eeb07fb3c685d5733521cc68e7318d05e52e709da2d755c80295b792
SHA5129da0fab44051211a9936fb8b815b5ed7a022088fb4a935f7c06b70b88b62b3802d3d629f813db1466e2785d7e17fdb971990d41a83753b8e7a3c1f2b7f890e6b
-
Filesize
134KB
MD5186835589f0e88fcc2e94b28a50a03fb
SHA1b374ec30e1a23376dd1c3f6590cd75793b211320
SHA256eca59997b5e954e1ff9c47ca15c2735fc72f9f8aa7cc044e24bc6025d52c97b9
SHA512bdd3dcc601b1480c3c9c9aee8432b791583516816aa2756ad00fb325cf6f3cbb93d77c94b6dbc2f967cf26cfeec2b5aa865ca1082222ffcebac9cdf57a5b2444