Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe
Resource
win7-20240903-en
General
-
Target
d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe
-
Size
96KB
-
MD5
78a061fad4189f343fcecc7875495c0c
-
SHA1
7103bafd20528fe2c8bc3aa252fb1f0fdf00d90d
-
SHA256
d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2
-
SHA512
954ff5b8eb6996f0d61a26bf2ac07475dd2e1d66989c0afd658ef59baba0c54578461701fdb3bf2360665426970cd39e7b761fa3c07413bfd53323750ea83345
-
SSDEEP
1536:OnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:OGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2692 omsecor.exe 2648 omsecor.exe 1336 omsecor.exe 1636 omsecor.exe 796 omsecor.exe 2968 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2060 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 2060 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 2692 omsecor.exe 2648 omsecor.exe 2648 omsecor.exe 1636 omsecor.exe 1636 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1860 set thread context of 2060 1860 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 28 PID 2692 set thread context of 2648 2692 omsecor.exe 30 PID 1336 set thread context of 1636 1336 omsecor.exe 35 PID 796 set thread context of 2968 796 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2060 1860 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 28 PID 1860 wrote to memory of 2060 1860 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 28 PID 1860 wrote to memory of 2060 1860 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 28 PID 1860 wrote to memory of 2060 1860 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 28 PID 1860 wrote to memory of 2060 1860 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 28 PID 1860 wrote to memory of 2060 1860 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 28 PID 2060 wrote to memory of 2692 2060 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 29 PID 2060 wrote to memory of 2692 2060 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 29 PID 2060 wrote to memory of 2692 2060 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 29 PID 2060 wrote to memory of 2692 2060 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 29 PID 2692 wrote to memory of 2648 2692 omsecor.exe 30 PID 2692 wrote to memory of 2648 2692 omsecor.exe 30 PID 2692 wrote to memory of 2648 2692 omsecor.exe 30 PID 2692 wrote to memory of 2648 2692 omsecor.exe 30 PID 2692 wrote to memory of 2648 2692 omsecor.exe 30 PID 2692 wrote to memory of 2648 2692 omsecor.exe 30 PID 2648 wrote to memory of 1336 2648 omsecor.exe 34 PID 2648 wrote to memory of 1336 2648 omsecor.exe 34 PID 2648 wrote to memory of 1336 2648 omsecor.exe 34 PID 2648 wrote to memory of 1336 2648 omsecor.exe 34 PID 1336 wrote to memory of 1636 1336 omsecor.exe 35 PID 1336 wrote to memory of 1636 1336 omsecor.exe 35 PID 1336 wrote to memory of 1636 1336 omsecor.exe 35 PID 1336 wrote to memory of 1636 1336 omsecor.exe 35 PID 1336 wrote to memory of 1636 1336 omsecor.exe 35 PID 1336 wrote to memory of 1636 1336 omsecor.exe 35 PID 1636 wrote to memory of 796 1636 omsecor.exe 36 PID 1636 wrote to memory of 796 1636 omsecor.exe 36 PID 1636 wrote to memory of 796 1636 omsecor.exe 36 PID 1636 wrote to memory of 796 1636 omsecor.exe 36 PID 796 wrote to memory of 2968 796 omsecor.exe 37 PID 796 wrote to memory of 2968 796 omsecor.exe 37 PID 796 wrote to memory of 2968 796 omsecor.exe 37 PID 796 wrote to memory of 2968 796 omsecor.exe 37 PID 796 wrote to memory of 2968 796 omsecor.exe 37 PID 796 wrote to memory of 2968 796 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe"C:\Users\Admin\AppData\Local\Temp\d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exeC:\Users\Admin\AppData\Local\Temp\d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55f607c56e2fe3ca072825993fb611a44
SHA1000d9c306bf15861bac1a1757b6f312dd5a6f09e
SHA256f52f26a20abf5baa956e227de6dadc2ed197a7ec061a10131b685a1b87d60ba4
SHA51271d5acc2f0db426fc7d65995da7346bb229ccbd8e9688659c9c97e73de81d0273b59c166899ee68469122c2e00dafe5029fad9655294c51a9dbc306dc0d59da6
-
Filesize
96KB
MD5bda0e514c9dd65fae440b0874e87b945
SHA199e86d2e1b34ec1024d806c6980e04e17db8cacb
SHA25620e0555a64660fe5578cd763b66eecaa2c139d65c2675ef2c05bfff1f02a13f7
SHA512522d042863469723aed5c7a5e5c4d392288fe4d04db58d33bd4889b2b8c13385256ab2b0d10ce0a710d670ad9c07c7249da367e754e9cfa874af46f7630ee78e
-
Filesize
96KB
MD5e9b713207fe723a43a89f1bb164fb805
SHA102759da733a3faa26f5e0f7058ae2a1f104eab4d
SHA2561c4fd0ffbe06f2f3327be79ef90dc03288a039c9b061dbc4d394713fb4c272b3
SHA5122cbe25f5bc6c0d954dd9ae87e274eda29462c2216f1c06a01e31a37da9407b0fdc50df9815ee2938e174dfd1c133def8b230efbdfd5c5f8a4216e0b2ca231826