Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-02-2025 05:20
Static task
static1
Behavioral task
behavioral1
Sample
c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe
Resource
win7-20241010-en
General
-
Target
c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe
-
Size
96KB
-
MD5
248c41cf2ed74592669cc5acbdddb78d
-
SHA1
25c1568262e4da6dab1b8f6fdb402988ec2c7bce
-
SHA256
c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f
-
SHA512
e06f7940fc7c63c7f6c458ba63b1160f73cbfeb297c5f9790029649f0f51450198a28354b1e0d86b0859f1a7cf2d9534f372f3f51a9e22eff21a0b365b54c570
-
SSDEEP
1536:InAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:IGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 844 omsecor.exe 2800 omsecor.exe 1476 omsecor.exe 2944 omsecor.exe 1640 omsecor.exe 1408 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2348 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 2348 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 844 omsecor.exe 2800 omsecor.exe 2800 omsecor.exe 2944 omsecor.exe 2944 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 432 set thread context of 2348 432 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 29 PID 844 set thread context of 2800 844 omsecor.exe 31 PID 1476 set thread context of 2944 1476 omsecor.exe 34 PID 1640 set thread context of 1408 1640 omsecor.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 432 wrote to memory of 2348 432 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 29 PID 432 wrote to memory of 2348 432 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 29 PID 432 wrote to memory of 2348 432 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 29 PID 432 wrote to memory of 2348 432 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 29 PID 432 wrote to memory of 2348 432 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 29 PID 432 wrote to memory of 2348 432 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 29 PID 2348 wrote to memory of 844 2348 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 30 PID 2348 wrote to memory of 844 2348 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 30 PID 2348 wrote to memory of 844 2348 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 30 PID 2348 wrote to memory of 844 2348 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 30 PID 844 wrote to memory of 2800 844 omsecor.exe 31 PID 844 wrote to memory of 2800 844 omsecor.exe 31 PID 844 wrote to memory of 2800 844 omsecor.exe 31 PID 844 wrote to memory of 2800 844 omsecor.exe 31 PID 844 wrote to memory of 2800 844 omsecor.exe 31 PID 844 wrote to memory of 2800 844 omsecor.exe 31 PID 2800 wrote to memory of 1476 2800 omsecor.exe 33 PID 2800 wrote to memory of 1476 2800 omsecor.exe 33 PID 2800 wrote to memory of 1476 2800 omsecor.exe 33 PID 2800 wrote to memory of 1476 2800 omsecor.exe 33 PID 1476 wrote to memory of 2944 1476 omsecor.exe 34 PID 1476 wrote to memory of 2944 1476 omsecor.exe 34 PID 1476 wrote to memory of 2944 1476 omsecor.exe 34 PID 1476 wrote to memory of 2944 1476 omsecor.exe 34 PID 1476 wrote to memory of 2944 1476 omsecor.exe 34 PID 1476 wrote to memory of 2944 1476 omsecor.exe 34 PID 2944 wrote to memory of 1640 2944 omsecor.exe 35 PID 2944 wrote to memory of 1640 2944 omsecor.exe 35 PID 2944 wrote to memory of 1640 2944 omsecor.exe 35 PID 2944 wrote to memory of 1640 2944 omsecor.exe 35 PID 1640 wrote to memory of 1408 1640 omsecor.exe 36 PID 1640 wrote to memory of 1408 1640 omsecor.exe 36 PID 1640 wrote to memory of 1408 1640 omsecor.exe 36 PID 1640 wrote to memory of 1408 1640 omsecor.exe 36 PID 1640 wrote to memory of 1408 1640 omsecor.exe 36 PID 1640 wrote to memory of 1408 1640 omsecor.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe"C:\Users\Admin\AppData\Local\Temp\c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exeC:\Users\Admin\AppData\Local\Temp\c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1408
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD578fe6209b79c5df0b373590c909a4ded
SHA15ae4003cd2187a5a62cc7df72ed4ff26b15fd501
SHA2568d084874f12d6db01d0ca24417962798d3341099121624e4bac2b2bdc61b24b8
SHA5120765b7837a8e4f9236c052f658af4a700a9504fe1892e24710c9a7ce7768075af4e5ca9ce749090d7835b12aaee45386b0290b5ed8153acfd9d82441692eebe1
-
Filesize
96KB
MD57dcdf89b830e60af10e56315f8ddadb1
SHA1b38521286b7cfe998de3bc4246444a8db8b23942
SHA256814d321f820b57984b14218b957cc40bbebb80279fdb5245b2cda6012dba6a22
SHA5128bf1264f9a3314a4436f206b301da8d5b8b6abb000cced047bfe071afb8d41e1aedb85312037cf6ad5aa439634f62f7bbc2fe349d13ea31fd8c10783a700075a
-
Filesize
96KB
MD5d8ecdba2da50a89dc4a3edfd0f9b2146
SHA1353174d55d013da1a643f2a4ad23c61610917a33
SHA25607008c366e5573b9f8103568e83d97666d1bdbae4b33339c4c586b8fccc559e1
SHA5128f9e0be41dc6fdcf10307eb597f4ea6fb790a4835ccc74939b02917b820c70c146c5e11ffd1cbdae8cf4e8199a26cd29d5d78f17d04055a77c33747f4de7c706