Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe
Resource
win7-20241023-en
General
-
Target
cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe
-
Size
96KB
-
MD5
dc13ac1eb0bcdc4664e868bfa5286890
-
SHA1
bde56c417416dbb298ec42e03f71cad3dff0fec0
-
SHA256
cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25dd
-
SHA512
b6557b334c9186aef75b091ef313eac20da106adf74fa67e66f6a35e84d74cfc40e42aefb0f284590da012e72be6847d8d4fcc6944c740e0f9205468180b6248
-
SSDEEP
1536:InAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:IGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1936 omsecor.exe 1668 omsecor.exe 1140 omsecor.exe 2092 omsecor.exe 2020 omsecor.exe 3036 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1256 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 1256 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 1936 omsecor.exe 1668 omsecor.exe 1668 omsecor.exe 2092 omsecor.exe 2092 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2416 set thread context of 1256 2416 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 30 PID 1936 set thread context of 1668 1936 omsecor.exe 32 PID 1140 set thread context of 2092 1140 omsecor.exe 36 PID 2020 set thread context of 3036 2020 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1256 2416 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 30 PID 2416 wrote to memory of 1256 2416 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 30 PID 2416 wrote to memory of 1256 2416 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 30 PID 2416 wrote to memory of 1256 2416 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 30 PID 2416 wrote to memory of 1256 2416 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 30 PID 2416 wrote to memory of 1256 2416 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 30 PID 1256 wrote to memory of 1936 1256 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 31 PID 1256 wrote to memory of 1936 1256 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 31 PID 1256 wrote to memory of 1936 1256 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 31 PID 1256 wrote to memory of 1936 1256 cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe 31 PID 1936 wrote to memory of 1668 1936 omsecor.exe 32 PID 1936 wrote to memory of 1668 1936 omsecor.exe 32 PID 1936 wrote to memory of 1668 1936 omsecor.exe 32 PID 1936 wrote to memory of 1668 1936 omsecor.exe 32 PID 1936 wrote to memory of 1668 1936 omsecor.exe 32 PID 1936 wrote to memory of 1668 1936 omsecor.exe 32 PID 1668 wrote to memory of 1140 1668 omsecor.exe 35 PID 1668 wrote to memory of 1140 1668 omsecor.exe 35 PID 1668 wrote to memory of 1140 1668 omsecor.exe 35 PID 1668 wrote to memory of 1140 1668 omsecor.exe 35 PID 1140 wrote to memory of 2092 1140 omsecor.exe 36 PID 1140 wrote to memory of 2092 1140 omsecor.exe 36 PID 1140 wrote to memory of 2092 1140 omsecor.exe 36 PID 1140 wrote to memory of 2092 1140 omsecor.exe 36 PID 1140 wrote to memory of 2092 1140 omsecor.exe 36 PID 1140 wrote to memory of 2092 1140 omsecor.exe 36 PID 2092 wrote to memory of 2020 2092 omsecor.exe 37 PID 2092 wrote to memory of 2020 2092 omsecor.exe 37 PID 2092 wrote to memory of 2020 2092 omsecor.exe 37 PID 2092 wrote to memory of 2020 2092 omsecor.exe 37 PID 2020 wrote to memory of 3036 2020 omsecor.exe 38 PID 2020 wrote to memory of 3036 2020 omsecor.exe 38 PID 2020 wrote to memory of 3036 2020 omsecor.exe 38 PID 2020 wrote to memory of 3036 2020 omsecor.exe 38 PID 2020 wrote to memory of 3036 2020 omsecor.exe 38 PID 2020 wrote to memory of 3036 2020 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe"C:\Users\Admin\AppData\Local\Temp\cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exeC:\Users\Admin\AppData\Local\Temp\cc5b4d954e2a9c74cdc31a11f4322b8f0e1ac300f15a8ec2fad16d17aeca25ddN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58362b05a1d1269f5706e261b5d82b3a5
SHA1fd10f4492e66f099eedba60680dea87bae8812ce
SHA256b306c43204d9539c4ec8c1beac0e2c70dc258a3cefc1fd33ff212cae7c3bdb27
SHA5124d15a99df34f13ec8083edb6e2688ac4ee8189bc83c63e20b8869522cb1c7ad8e19376a7867f8d76826a3bc07435403689b5696079b3132924439cd6d1c1f6d3
-
Filesize
96KB
MD55378b0f28f798db088f0537dd2d228da
SHA1566f7a0839e181cc05baba38e65af03263ecf006
SHA2567ed0d971387f04376e3201c782a4958272ce9873aab61e1ab3d4fae9d2aea55c
SHA51280dda468790355b3c2894d61dbbdc26358d3d867fc4c551742f2a16cf0c31af9e27ff2d0dd5df6b4a06284eaec99c9b421fe23cb7c97613a02dfcbb73008674d
-
Filesize
96KB
MD5758d1d009e6b08fa7ab9319844f9ab70
SHA1caa1c85069b2ff92b7499ac575fd37f32aa02d00
SHA2568df34e8c13998a4253cc32fa50678b9dba38754460e76b136537d78173cc2b76
SHA51201ac1f91e559826780801be85730b25efe0f5c29acb1a8c283e9a3618a28b5efc6eb609d9e822c134a864e1796b122f2158464cac0538b8a0e93c35e51f80864