Analysis
-
max time kernel
117s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-02-2025 12:04
Static task
static1
Behavioral task
behavioral1
Sample
8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe
Resource
win7-20240903-en
General
-
Target
8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe
-
Size
96KB
-
MD5
20f598dc0670e96b74bbb6459acecb7a
-
SHA1
0b5408761377fc586bab392f277ccb345b863e31
-
SHA256
8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9
-
SHA512
66205064f7ce794dc7fdd0fa58b128f411be9505203bb504b340ededd06f3e00df37732affd3ae2fc9609f1ee9b69440aaa52e8f9908d7d26c7bf0572505b7af
-
SSDEEP
1536:pnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxT:pGs8cd8eXlYairZYqMddH13T
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1712 omsecor.exe 2200 omsecor.exe 2028 omsecor.exe 2008 omsecor.exe 2840 omsecor.exe 2228 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2404 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 2404 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 1712 omsecor.exe 2200 omsecor.exe 2200 omsecor.exe 2008 omsecor.exe 2008 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2108 set thread context of 2404 2108 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 30 PID 1712 set thread context of 2200 1712 omsecor.exe 32 PID 2028 set thread context of 2008 2028 omsecor.exe 36 PID 2840 set thread context of 2228 2840 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2404 2108 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 30 PID 2108 wrote to memory of 2404 2108 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 30 PID 2108 wrote to memory of 2404 2108 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 30 PID 2108 wrote to memory of 2404 2108 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 30 PID 2108 wrote to memory of 2404 2108 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 30 PID 2108 wrote to memory of 2404 2108 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 30 PID 2404 wrote to memory of 1712 2404 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 31 PID 2404 wrote to memory of 1712 2404 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 31 PID 2404 wrote to memory of 1712 2404 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 31 PID 2404 wrote to memory of 1712 2404 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 31 PID 1712 wrote to memory of 2200 1712 omsecor.exe 32 PID 1712 wrote to memory of 2200 1712 omsecor.exe 32 PID 1712 wrote to memory of 2200 1712 omsecor.exe 32 PID 1712 wrote to memory of 2200 1712 omsecor.exe 32 PID 1712 wrote to memory of 2200 1712 omsecor.exe 32 PID 1712 wrote to memory of 2200 1712 omsecor.exe 32 PID 2200 wrote to memory of 2028 2200 omsecor.exe 35 PID 2200 wrote to memory of 2028 2200 omsecor.exe 35 PID 2200 wrote to memory of 2028 2200 omsecor.exe 35 PID 2200 wrote to memory of 2028 2200 omsecor.exe 35 PID 2028 wrote to memory of 2008 2028 omsecor.exe 36 PID 2028 wrote to memory of 2008 2028 omsecor.exe 36 PID 2028 wrote to memory of 2008 2028 omsecor.exe 36 PID 2028 wrote to memory of 2008 2028 omsecor.exe 36 PID 2028 wrote to memory of 2008 2028 omsecor.exe 36 PID 2028 wrote to memory of 2008 2028 omsecor.exe 36 PID 2008 wrote to memory of 2840 2008 omsecor.exe 37 PID 2008 wrote to memory of 2840 2008 omsecor.exe 37 PID 2008 wrote to memory of 2840 2008 omsecor.exe 37 PID 2008 wrote to memory of 2840 2008 omsecor.exe 37 PID 2840 wrote to memory of 2228 2840 omsecor.exe 38 PID 2840 wrote to memory of 2228 2840 omsecor.exe 38 PID 2840 wrote to memory of 2228 2840 omsecor.exe 38 PID 2840 wrote to memory of 2228 2840 omsecor.exe 38 PID 2840 wrote to memory of 2228 2840 omsecor.exe 38 PID 2840 wrote to memory of 2228 2840 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe"C:\Users\Admin\AppData\Local\Temp\8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exeC:\Users\Admin\AppData\Local\Temp\8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD536a43408f17acd1fb035da2d32033ebd
SHA15364b264d9871a6adbe8f8391695a3b99bad3cea
SHA25623c003d549addf4ff630da9587a0c55fe998db9341fa84aee2cae5d5aefd9182
SHA512da8d176c44f2021d23621b420406b0f673bba04e7c40b6b452fd85e277e2fa23a3570167736e74dc7fe78215caeb1b2560e1051b03719ee67f4ab7e804284dc3
-
Filesize
96KB
MD5480f2e57b56a07f622870b9b3a932311
SHA1260aa9b2fbfe1f391cac16bffec87d2bf274efa9
SHA256f976619abc74fd08b56b0352c618d8983e06944430bc60d70693d5e9369b030e
SHA512f4b13bd9f05392e1934d730c9502ccf81c224ffbbbc372927304829f6fba2395a32e884b15e21188a423a3fdf194d07a267801270cac695cd3fc821a0109d787
-
Filesize
96KB
MD5123fcd330b6f9773c17065e7d3fc1d4d
SHA1fd99b20e57da0103bea165f140cdf6b4365a3862
SHA25642817c4ed1b9b1cc3fd72080a3e304e9fa70b9788585c33a462028486b6b2b21
SHA512f3b93c2c71260866e164784104c4fb4406e766ce0ba045df1a8629aed293da4f8a6b25fa8188b39b2b737b8611ae8808543848d497e87363e2e8db642baa4afd