Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 06:43
Static task
static1
Behavioral task
behavioral1
Sample
c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe
Resource
win7-20241010-en
General
-
Target
c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe
-
Size
96KB
-
MD5
2acb002195d7adb3c6eace37311cb4c0
-
SHA1
685bf6ed8201ad3465d414987f997b6712434536
-
SHA256
c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426
-
SHA512
4f1fcff94d824216d41be3aaf4723912e013b01c0830c298d778c30b1fc501346bbe0751e647542b42f4ebe19061927d835863a568cf35577318312c51ad1129
-
SSDEEP
1536:AnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:AGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2292 omsecor.exe 2768 omsecor.exe 2744 omsecor.exe 2112 omsecor.exe 2488 omsecor.exe 776 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 840 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 840 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 2292 omsecor.exe 2768 omsecor.exe 2768 omsecor.exe 2112 omsecor.exe 2112 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2652 set thread context of 840 2652 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 31 PID 2292 set thread context of 2768 2292 omsecor.exe 33 PID 2744 set thread context of 2112 2744 omsecor.exe 36 PID 2488 set thread context of 776 2488 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2652 wrote to memory of 840 2652 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 31 PID 2652 wrote to memory of 840 2652 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 31 PID 2652 wrote to memory of 840 2652 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 31 PID 2652 wrote to memory of 840 2652 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 31 PID 2652 wrote to memory of 840 2652 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 31 PID 2652 wrote to memory of 840 2652 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 31 PID 840 wrote to memory of 2292 840 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 32 PID 840 wrote to memory of 2292 840 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 32 PID 840 wrote to memory of 2292 840 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 32 PID 840 wrote to memory of 2292 840 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 32 PID 2292 wrote to memory of 2768 2292 omsecor.exe 33 PID 2292 wrote to memory of 2768 2292 omsecor.exe 33 PID 2292 wrote to memory of 2768 2292 omsecor.exe 33 PID 2292 wrote to memory of 2768 2292 omsecor.exe 33 PID 2292 wrote to memory of 2768 2292 omsecor.exe 33 PID 2292 wrote to memory of 2768 2292 omsecor.exe 33 PID 2768 wrote to memory of 2744 2768 omsecor.exe 35 PID 2768 wrote to memory of 2744 2768 omsecor.exe 35 PID 2768 wrote to memory of 2744 2768 omsecor.exe 35 PID 2768 wrote to memory of 2744 2768 omsecor.exe 35 PID 2744 wrote to memory of 2112 2744 omsecor.exe 36 PID 2744 wrote to memory of 2112 2744 omsecor.exe 36 PID 2744 wrote to memory of 2112 2744 omsecor.exe 36 PID 2744 wrote to memory of 2112 2744 omsecor.exe 36 PID 2744 wrote to memory of 2112 2744 omsecor.exe 36 PID 2744 wrote to memory of 2112 2744 omsecor.exe 36 PID 2112 wrote to memory of 2488 2112 omsecor.exe 37 PID 2112 wrote to memory of 2488 2112 omsecor.exe 37 PID 2112 wrote to memory of 2488 2112 omsecor.exe 37 PID 2112 wrote to memory of 2488 2112 omsecor.exe 37 PID 2488 wrote to memory of 776 2488 omsecor.exe 38 PID 2488 wrote to memory of 776 2488 omsecor.exe 38 PID 2488 wrote to memory of 776 2488 omsecor.exe 38 PID 2488 wrote to memory of 776 2488 omsecor.exe 38 PID 2488 wrote to memory of 776 2488 omsecor.exe 38 PID 2488 wrote to memory of 776 2488 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe"C:\Users\Admin\AppData\Local\Temp\c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exeC:\Users\Admin\AppData\Local\Temp\c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:776
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b6e040d7c07f726d569c9c28faa7b7a0
SHA138f0bb2980a8b099c5c2800d6b5127e18a5e9ef5
SHA256359244f68fc915236a6983c922263b926b1f02d93b0149452dc25ed6b642de10
SHA512aa3feca21e344be149e0006e46f90ea81257795a3e94cc6de90e6cd9d468b60cfc1167f346f8053fb198d3b05f8f05557450bfe23e80d01e1439a45f08fb9afc
-
Filesize
96KB
MD5258d671ed52c131b865e73a21c4c560e
SHA14384f2c868197546708fbac514017e6fc84c414b
SHA256e78c2aefd57c0907a3be82bc371e773d1b3f6b18cea637c07405d38fa897a5f5
SHA512c9eaf7e41bba51abe1463c1deabe53e5f3149907f4baa44613ab466ed57a53ad63053243c9585f8f088e48cd703db08ed90dd746069aa0f3379c10432ca95da6
-
Filesize
96KB
MD5224bfd6dc3aeb56430237ba18b816d90
SHA1f7e5c1f5d9a7600a49e41a1f3de7070c4b1f37f1
SHA2566bfae2dfe9dec1dfee11e0c1434d61bfa09a480e64c2d10f78b3a9839022f7ce
SHA512f02ab09cecb8359c630323f8321630b120f83eb922c52ea07152859104ea896a1cd81246f5ef2173cd8d8123e0820a9d76a33ba0d0aeb04fc124eebc8e4c019c