Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 07:38
Static task
static1
Behavioral task
behavioral1
Sample
813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe
Resource
win7-20240903-en
General
-
Target
813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe
-
Size
96KB
-
MD5
7fcd7e5707d004b75fb0760d1e26bb82
-
SHA1
0f7a4d3519bb949d4ce79640c88104acd4cabd10
-
SHA256
813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c
-
SHA512
4a678ace5c8cc26ca5b01cfa22be29de5c46479ce2c3b678f303a18ff0547233b0a7d12ac4f4e56cb4770c202d09a12a5beb47150c73164c5b6cda540e2f512a
-
SSDEEP
1536:unAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:uGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2708 omsecor.exe 2868 omsecor.exe 2816 omsecor.exe 1940 omsecor.exe 2956 omsecor.exe 2248 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2784 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 2784 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 2708 omsecor.exe 2868 omsecor.exe 2868 omsecor.exe 1940 omsecor.exe 1940 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2936 set thread context of 2784 2936 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 30 PID 2708 set thread context of 2868 2708 omsecor.exe 32 PID 2816 set thread context of 1940 2816 omsecor.exe 36 PID 2956 set thread context of 2248 2956 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2784 2936 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 30 PID 2936 wrote to memory of 2784 2936 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 30 PID 2936 wrote to memory of 2784 2936 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 30 PID 2936 wrote to memory of 2784 2936 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 30 PID 2936 wrote to memory of 2784 2936 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 30 PID 2936 wrote to memory of 2784 2936 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 30 PID 2784 wrote to memory of 2708 2784 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 31 PID 2784 wrote to memory of 2708 2784 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 31 PID 2784 wrote to memory of 2708 2784 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 31 PID 2784 wrote to memory of 2708 2784 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 31 PID 2708 wrote to memory of 2868 2708 omsecor.exe 32 PID 2708 wrote to memory of 2868 2708 omsecor.exe 32 PID 2708 wrote to memory of 2868 2708 omsecor.exe 32 PID 2708 wrote to memory of 2868 2708 omsecor.exe 32 PID 2708 wrote to memory of 2868 2708 omsecor.exe 32 PID 2708 wrote to memory of 2868 2708 omsecor.exe 32 PID 2868 wrote to memory of 2816 2868 omsecor.exe 35 PID 2868 wrote to memory of 2816 2868 omsecor.exe 35 PID 2868 wrote to memory of 2816 2868 omsecor.exe 35 PID 2868 wrote to memory of 2816 2868 omsecor.exe 35 PID 2816 wrote to memory of 1940 2816 omsecor.exe 36 PID 2816 wrote to memory of 1940 2816 omsecor.exe 36 PID 2816 wrote to memory of 1940 2816 omsecor.exe 36 PID 2816 wrote to memory of 1940 2816 omsecor.exe 36 PID 2816 wrote to memory of 1940 2816 omsecor.exe 36 PID 2816 wrote to memory of 1940 2816 omsecor.exe 36 PID 1940 wrote to memory of 2956 1940 omsecor.exe 37 PID 1940 wrote to memory of 2956 1940 omsecor.exe 37 PID 1940 wrote to memory of 2956 1940 omsecor.exe 37 PID 1940 wrote to memory of 2956 1940 omsecor.exe 37 PID 2956 wrote to memory of 2248 2956 omsecor.exe 38 PID 2956 wrote to memory of 2248 2956 omsecor.exe 38 PID 2956 wrote to memory of 2248 2956 omsecor.exe 38 PID 2956 wrote to memory of 2248 2956 omsecor.exe 38 PID 2956 wrote to memory of 2248 2956 omsecor.exe 38 PID 2956 wrote to memory of 2248 2956 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe"C:\Users\Admin\AppData\Local\Temp\813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exeC:\Users\Admin\AppData\Local\Temp\813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e58259de64cd932f61659feee22e2a79
SHA11bb6d1cda2dbdfcc39e9593070c31e6035e05596
SHA256e9547a90f06064f9f86fc4cce1f34adcb73aed4a50797918cc910147008fd452
SHA5121642d097864db315a1268aece1d635eb57838dec5564914cdfe71475de575cc03ac745e23b527140574dd0898254958883ae5a36462c3180ac4e36aa0f982e76
-
Filesize
96KB
MD5da488decbb181a77a787658592fc0b73
SHA1cddf220bb794c18782bb2ab403ed02b9a7f26ebf
SHA256912b29fe2f82eb2febbabe7e70bc3411219fe4399f32a0989793543aad033414
SHA5120c2b969b7f61fd9946aaeec9c68e436c03fbc175bdb4cb0ac8ed1492364410b747f0080bef9ef970a56028f1d8e2aed04f8d26330fb06b8414d7328b26b3872e
-
Filesize
96KB
MD56e25c83cee0d2745dc3a0925f02cbb28
SHA17af256043404890efcf2e8cfaf47f44dbd29efb7
SHA256a9efda528c9149541df44e59d532b2e4c993e022a4ee642a46ba48cb6343f268
SHA512b8d00278a0e423da585cb0ee25bfc4e642550a5881ccb17fd750bd2b5bf0154269d621fd7759885bcfa498f12171c381f00619e32aa1f99f5e790d318c5e89b0