Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 13:08
Static task
static1
Behavioral task
behavioral1
Sample
b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe
Resource
win7-20240903-en
General
-
Target
b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe
-
Size
96KB
-
MD5
82ec32e61d3cc855216c94aad2018f85
-
SHA1
95032b286624fc8c10a48a2c4ec163b0d695976e
-
SHA256
b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385
-
SHA512
0b5c54953891e065906f62d65afc9f3ca7684ed7ed578ade6a7e32e6f378bca823045de58f3ee303838da179f52d98eb8f6fcc3881a6979628beab961778f013
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:MGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2756 omsecor.exe 2748 omsecor.exe 1636 omsecor.exe 2016 omsecor.exe 1140 omsecor.exe 2364 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2696 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 2696 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 2756 omsecor.exe 2748 omsecor.exe 2748 omsecor.exe 2016 omsecor.exe 2016 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1448 set thread context of 2696 1448 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 30 PID 2756 set thread context of 2748 2756 omsecor.exe 32 PID 1636 set thread context of 2016 1636 omsecor.exe 36 PID 1140 set thread context of 2364 1140 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2696 1448 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 30 PID 1448 wrote to memory of 2696 1448 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 30 PID 1448 wrote to memory of 2696 1448 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 30 PID 1448 wrote to memory of 2696 1448 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 30 PID 1448 wrote to memory of 2696 1448 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 30 PID 1448 wrote to memory of 2696 1448 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 30 PID 2696 wrote to memory of 2756 2696 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 31 PID 2696 wrote to memory of 2756 2696 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 31 PID 2696 wrote to memory of 2756 2696 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 31 PID 2696 wrote to memory of 2756 2696 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 31 PID 2756 wrote to memory of 2748 2756 omsecor.exe 32 PID 2756 wrote to memory of 2748 2756 omsecor.exe 32 PID 2756 wrote to memory of 2748 2756 omsecor.exe 32 PID 2756 wrote to memory of 2748 2756 omsecor.exe 32 PID 2756 wrote to memory of 2748 2756 omsecor.exe 32 PID 2756 wrote to memory of 2748 2756 omsecor.exe 32 PID 2748 wrote to memory of 1636 2748 omsecor.exe 35 PID 2748 wrote to memory of 1636 2748 omsecor.exe 35 PID 2748 wrote to memory of 1636 2748 omsecor.exe 35 PID 2748 wrote to memory of 1636 2748 omsecor.exe 35 PID 1636 wrote to memory of 2016 1636 omsecor.exe 36 PID 1636 wrote to memory of 2016 1636 omsecor.exe 36 PID 1636 wrote to memory of 2016 1636 omsecor.exe 36 PID 1636 wrote to memory of 2016 1636 omsecor.exe 36 PID 1636 wrote to memory of 2016 1636 omsecor.exe 36 PID 1636 wrote to memory of 2016 1636 omsecor.exe 36 PID 2016 wrote to memory of 1140 2016 omsecor.exe 37 PID 2016 wrote to memory of 1140 2016 omsecor.exe 37 PID 2016 wrote to memory of 1140 2016 omsecor.exe 37 PID 2016 wrote to memory of 1140 2016 omsecor.exe 37 PID 1140 wrote to memory of 2364 1140 omsecor.exe 38 PID 1140 wrote to memory of 2364 1140 omsecor.exe 38 PID 1140 wrote to memory of 2364 1140 omsecor.exe 38 PID 1140 wrote to memory of 2364 1140 omsecor.exe 38 PID 1140 wrote to memory of 2364 1140 omsecor.exe 38 PID 1140 wrote to memory of 2364 1140 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe"C:\Users\Admin\AppData\Local\Temp\b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exeC:\Users\Admin\AppData\Local\Temp\b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b4edde9ecce673eb4f02b16fb9ef291d
SHA19e81626129858fc9c02e9fac95ccc592bced1b57
SHA256c94288e71549ed0d3cdc1385f7ed36eb1b4517b49411c1bf967f963cebf6bb41
SHA512d40f4fd78a894ef75e4f0a3c3e9bc6d720aa2980af72b437f144d86e28850ce4798dff1aaf2fc84fca135ccbb60fbfb18387cf83626a50e9e57906e79c67f17f
-
Filesize
96KB
MD5ba08024a60b18210e1856a0ef5e3ef89
SHA10e864e0d21db978c74f41d5257bcc7ec2021adaf
SHA25692910ba7d99376a42e5856c83ab8038588b6ac78ed23acb1b9bdd48183b9ac61
SHA5128ead467f2ab50b6714cb534a52e00c03650d0848a1ef4ffc82ae78d292dae4420c91a942a99ff06e1b1f79236f7ad80e0418d672b94bd544c5342cb700d4bed8
-
Filesize
96KB
MD5b0c887f43324993a3c737372ed12ba2b
SHA1471b43326b162a8d58c1404abb711100c05b1928
SHA256c3988a172c649c1eb05984e91152c903d968723cd7b675f7a03519293eb758b6
SHA512da94de095a7132681b2403115b9072cb4d2013c496372afced25065befb370c45b8183c830bd9ce4f9621909f1b8ed265c4c61cdce20d0adcf6f2bb9366ebead