Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/02/2025, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe
Resource
win7-20240903-en
General
-
Target
a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe
-
Size
96KB
-
MD5
90b637875a749ac270736af19984375b
-
SHA1
11b094408ee9254e527e8a778e3e384d3ac12ec7
-
SHA256
a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868
-
SHA512
44b0535f2118b0f1b0d91809e557ad01cadbdf1917e34f39b13542375f7b3132e5da8d88b63c833aeada839670db5871219b0cafcbf6a9f41ae1e86c3c70e603
-
SSDEEP
1536:SnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:SGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2956 omsecor.exe 2424 omsecor.exe -
Loads dropped DLL 3 IoCs
pid Process 1840 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 1840 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 2956 omsecor.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2164 set thread context of 1840 2164 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 31 PID 2956 set thread context of 2424 2956 omsecor.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2164 wrote to memory of 1840 2164 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 31 PID 2164 wrote to memory of 1840 2164 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 31 PID 2164 wrote to memory of 1840 2164 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 31 PID 2164 wrote to memory of 1840 2164 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 31 PID 2164 wrote to memory of 1840 2164 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 31 PID 2164 wrote to memory of 1840 2164 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 31 PID 1840 wrote to memory of 2956 1840 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 32 PID 1840 wrote to memory of 2956 1840 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 32 PID 1840 wrote to memory of 2956 1840 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 32 PID 1840 wrote to memory of 2956 1840 a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe 32 PID 2956 wrote to memory of 2424 2956 omsecor.exe 33 PID 2956 wrote to memory of 2424 2956 omsecor.exe 33 PID 2956 wrote to memory of 2424 2956 omsecor.exe 33 PID 2956 wrote to memory of 2424 2956 omsecor.exe 33 PID 2956 wrote to memory of 2424 2956 omsecor.exe 33 PID 2956 wrote to memory of 2424 2956 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe"C:\Users\Admin\AppData\Local\Temp\a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exeC:\Users\Admin\AppData\Local\Temp\a5f9a9723f445f7ecff9e5756004a81c8d7c35370fc1b721ac6285c7f4010868.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD51cfb5724675edaa889804a56e1754dc6
SHA14cfefd037e825e9b9e35f5728043b3d2095b03f2
SHA256a9a1f3fecd58572ecc7824af05d50a1b5a3bc97b0dd7e024a1672409373405cd
SHA5125b87a03d27e11bb80c429958e7750eeaaef1e2cf6010449ee7ca56bbad284ac66f890829c0dcc7b427806bec1751287697eb39c18284b8fb2db57cc46cf19a06