Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 10:12
Static task
static1
Behavioral task
behavioral1
Sample
00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe
Resource
win7-20240903-en
General
-
Target
00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe
-
Size
134KB
-
MD5
17abba9b7903c73f47d031d6a7ca2973
-
SHA1
054397fba61cb951cb8cac20adada39cf4c0d3f6
-
SHA256
00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4
-
SHA512
c4513e79cd8b9f162245348e410120dbdb725f71d2971d0a645ad0fc93b132f1211a3e8ae4f5bff52c7a8cead5f94af4cd8abc0a120770a081fab31a30400e28
-
SSDEEP
1536:FDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiX:liRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2288 omsecor.exe 1260 omsecor.exe 2924 omsecor.exe 2948 omsecor.exe 1724 omsecor.exe 2960 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 772 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 772 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 2288 omsecor.exe 1260 omsecor.exe 1260 omsecor.exe 2948 omsecor.exe 2948 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 352 set thread context of 772 352 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 30 PID 2288 set thread context of 1260 2288 omsecor.exe 32 PID 2924 set thread context of 2948 2924 omsecor.exe 36 PID 1724 set thread context of 2960 1724 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 352 wrote to memory of 772 352 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 30 PID 352 wrote to memory of 772 352 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 30 PID 352 wrote to memory of 772 352 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 30 PID 352 wrote to memory of 772 352 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 30 PID 352 wrote to memory of 772 352 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 30 PID 352 wrote to memory of 772 352 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 30 PID 772 wrote to memory of 2288 772 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 31 PID 772 wrote to memory of 2288 772 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 31 PID 772 wrote to memory of 2288 772 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 31 PID 772 wrote to memory of 2288 772 00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe 31 PID 2288 wrote to memory of 1260 2288 omsecor.exe 32 PID 2288 wrote to memory of 1260 2288 omsecor.exe 32 PID 2288 wrote to memory of 1260 2288 omsecor.exe 32 PID 2288 wrote to memory of 1260 2288 omsecor.exe 32 PID 2288 wrote to memory of 1260 2288 omsecor.exe 32 PID 2288 wrote to memory of 1260 2288 omsecor.exe 32 PID 1260 wrote to memory of 2924 1260 omsecor.exe 35 PID 1260 wrote to memory of 2924 1260 omsecor.exe 35 PID 1260 wrote to memory of 2924 1260 omsecor.exe 35 PID 1260 wrote to memory of 2924 1260 omsecor.exe 35 PID 2924 wrote to memory of 2948 2924 omsecor.exe 36 PID 2924 wrote to memory of 2948 2924 omsecor.exe 36 PID 2924 wrote to memory of 2948 2924 omsecor.exe 36 PID 2924 wrote to memory of 2948 2924 omsecor.exe 36 PID 2924 wrote to memory of 2948 2924 omsecor.exe 36 PID 2924 wrote to memory of 2948 2924 omsecor.exe 36 PID 2948 wrote to memory of 1724 2948 omsecor.exe 37 PID 2948 wrote to memory of 1724 2948 omsecor.exe 37 PID 2948 wrote to memory of 1724 2948 omsecor.exe 37 PID 2948 wrote to memory of 1724 2948 omsecor.exe 37 PID 1724 wrote to memory of 2960 1724 omsecor.exe 38 PID 1724 wrote to memory of 2960 1724 omsecor.exe 38 PID 1724 wrote to memory of 2960 1724 omsecor.exe 38 PID 1724 wrote to memory of 2960 1724 omsecor.exe 38 PID 1724 wrote to memory of 2960 1724 omsecor.exe 38 PID 1724 wrote to memory of 2960 1724 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe"C:\Users\Admin\AppData\Local\Temp\00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exeC:\Users\Admin\AppData\Local\Temp\00700fd8f51e7e4a3347522e3d5698c1a326441fe0dd0fce00cdc30c161d02e4.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f12dbc220a90f9e2d2ad8303e5ecdf8f
SHA1080e72badfb81e725ac3e52a56631f35b7f19505
SHA256033c2a7eaf3e01e3a5cfdb858472fae641a5c0467b5573e31228a54484d2ad3f
SHA512932fbb6ad2a17125f8566ac4e9ab9f7fa4aea9e8d5805b73232272f8608604f7d9ddbb22d1c18b717868242da6fe4908218d7b039c4eeeaefeea14a63d85bd8e
-
Filesize
134KB
MD5ab096ccb21270e3ab2616e7583508409
SHA1baee669b1227476478d05774b34cc210594b0296
SHA256e9de6a136e07e6b60dc788c30b38190af4c89ba91acf0d3ad7475fa9cc19a601
SHA51295eb5e098129cc9677355aee93627e1e86cdda03dc6348fb9d31ffcda861370df79fdc7ec98c31f4d9b22f0e008f00dd3069c28cc934adba3cc221103e91a115
-
Filesize
134KB
MD50b355681032323f769a472ca07ff49a1
SHA1cb16d0440e9d2e93d461087a20bebd4d498314ba
SHA2562d1f24a78307d2bd11d49f3a813abc5b75578c8e77ddd75009d12c33c179af7a
SHA5123ab317e9251c5fce71ca2fb3d889c06712bce53193a5814dab2c020339af05c5ae378dd168715d9c46beb7a89913d62a1786375c1b5144f809985cfaa1848b57