Analysis
-
max time kernel
116s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 18:51
Static task
static1
Behavioral task
behavioral1
Sample
04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe
Resource
win7-20241010-en
General
-
Target
04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe
-
Size
96KB
-
MD5
04d19ba87ec5e17d08b5d034006329c0
-
SHA1
c9ece5653d9dd3d8212a0e4722d5753f62c4ca8f
-
SHA256
04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90c
-
SHA512
04df3c3d0c633aa819dd8dbeab615f061d5046eb5bd0c73168904d50c33ccbe97ae7c11699d4c88e760ad5b660f3e4567572143c58762013d90075ff1a415257
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:zGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2184 omsecor.exe 2040 omsecor.exe 2356 omsecor.exe 1348 omsecor.exe 2216 omsecor.exe 2244 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 760 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 760 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 2184 omsecor.exe 2040 omsecor.exe 2040 omsecor.exe 1348 omsecor.exe 1348 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1736 set thread context of 760 1736 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 30 PID 2184 set thread context of 2040 2184 omsecor.exe 32 PID 2356 set thread context of 1348 2356 omsecor.exe 36 PID 2216 set thread context of 2244 2216 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1736 wrote to memory of 760 1736 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 30 PID 1736 wrote to memory of 760 1736 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 30 PID 1736 wrote to memory of 760 1736 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 30 PID 1736 wrote to memory of 760 1736 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 30 PID 1736 wrote to memory of 760 1736 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 30 PID 1736 wrote to memory of 760 1736 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 30 PID 760 wrote to memory of 2184 760 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 31 PID 760 wrote to memory of 2184 760 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 31 PID 760 wrote to memory of 2184 760 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 31 PID 760 wrote to memory of 2184 760 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 31 PID 2184 wrote to memory of 2040 2184 omsecor.exe 32 PID 2184 wrote to memory of 2040 2184 omsecor.exe 32 PID 2184 wrote to memory of 2040 2184 omsecor.exe 32 PID 2184 wrote to memory of 2040 2184 omsecor.exe 32 PID 2184 wrote to memory of 2040 2184 omsecor.exe 32 PID 2184 wrote to memory of 2040 2184 omsecor.exe 32 PID 2040 wrote to memory of 2356 2040 omsecor.exe 35 PID 2040 wrote to memory of 2356 2040 omsecor.exe 35 PID 2040 wrote to memory of 2356 2040 omsecor.exe 35 PID 2040 wrote to memory of 2356 2040 omsecor.exe 35 PID 2356 wrote to memory of 1348 2356 omsecor.exe 36 PID 2356 wrote to memory of 1348 2356 omsecor.exe 36 PID 2356 wrote to memory of 1348 2356 omsecor.exe 36 PID 2356 wrote to memory of 1348 2356 omsecor.exe 36 PID 2356 wrote to memory of 1348 2356 omsecor.exe 36 PID 2356 wrote to memory of 1348 2356 omsecor.exe 36 PID 1348 wrote to memory of 2216 1348 omsecor.exe 37 PID 1348 wrote to memory of 2216 1348 omsecor.exe 37 PID 1348 wrote to memory of 2216 1348 omsecor.exe 37 PID 1348 wrote to memory of 2216 1348 omsecor.exe 37 PID 2216 wrote to memory of 2244 2216 omsecor.exe 38 PID 2216 wrote to memory of 2244 2216 omsecor.exe 38 PID 2216 wrote to memory of 2244 2216 omsecor.exe 38 PID 2216 wrote to memory of 2244 2216 omsecor.exe 38 PID 2216 wrote to memory of 2244 2216 omsecor.exe 38 PID 2216 wrote to memory of 2244 2216 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe"C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exeC:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5015ef091408362aee7661ea5b51ad5c4
SHA124bbe5e0ee111439a378f0e24af57b76d0732b24
SHA2565eb8136421ad315ff50a8cca57799615c42a09e57cc9e6e382d81732992def1b
SHA512c0b167e786296743162217c39e792547041f7bec8398697c30e752f61bf4d850e944684f3ee80b979df1a42d1cf3d5e647366b0624f842b3daaffa6679dbe0c0
-
Filesize
96KB
MD5ca6a4e1ba3e64b60433127ecc6fb0b9c
SHA128b62f591a88cc162c8d76b407b5db449e54a487
SHA2561d05818e419407fba3171b76f7a5fca5211a5483277277a6ed96d29fc8a32bc4
SHA512f76f8e0207982bbda2a2c0a13a1d33689fa369dcd20fa497aac615420abaa74ceb63b6165027c2c87c9928cd88844ac7da526f0f3d6ccd99af2332be0c07e55b
-
Filesize
96KB
MD55c71038b80a06027d245f41299dd061d
SHA171330de80f17b5addc8f279fd041395978a3eb5a
SHA2560d980767ef404077e0c8cfd5adbc53e2f0270e7d6f6bd8c2f05b2e03daa67f68
SHA512994aab6beabfe2c970e656a7855b10a2110bf9686675fddaf608eae773730985e00a89ede1315ff686a576b63c22fc1bceef3e2aa532976ff8824de530a47a63