Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe
Resource
win7-20240903-en
General
-
Target
3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe
-
Size
96KB
-
MD5
0a40b0a014c036e6d27dd45bf0edf260
-
SHA1
52937a8666e9811f57b77872d75a1147fc612dbb
-
SHA256
3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620
-
SHA512
88426746aa304f462eacf6f48b2a6baea193ae82e11059bf555d08ccac96f28a617fdbc97815ab3fa72c414f6f806f3c4dd143c1eab355dc0f4014ae17fa522f
-
SSDEEP
1536:DnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:DGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2792 omsecor.exe 2780 omsecor.exe 2864 omsecor.exe 1784 omsecor.exe 1800 omsecor.exe 2180 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2772 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 2772 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 2792 omsecor.exe 2780 omsecor.exe 2780 omsecor.exe 1784 omsecor.exe 1784 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2736 set thread context of 2772 2736 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 30 PID 2792 set thread context of 2780 2792 omsecor.exe 32 PID 2864 set thread context of 1784 2864 omsecor.exe 36 PID 1800 set thread context of 2180 1800 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2772 2736 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 30 PID 2736 wrote to memory of 2772 2736 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 30 PID 2736 wrote to memory of 2772 2736 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 30 PID 2736 wrote to memory of 2772 2736 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 30 PID 2736 wrote to memory of 2772 2736 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 30 PID 2736 wrote to memory of 2772 2736 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 30 PID 2772 wrote to memory of 2792 2772 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 31 PID 2772 wrote to memory of 2792 2772 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 31 PID 2772 wrote to memory of 2792 2772 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 31 PID 2772 wrote to memory of 2792 2772 3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe 31 PID 2792 wrote to memory of 2780 2792 omsecor.exe 32 PID 2792 wrote to memory of 2780 2792 omsecor.exe 32 PID 2792 wrote to memory of 2780 2792 omsecor.exe 32 PID 2792 wrote to memory of 2780 2792 omsecor.exe 32 PID 2792 wrote to memory of 2780 2792 omsecor.exe 32 PID 2792 wrote to memory of 2780 2792 omsecor.exe 32 PID 2780 wrote to memory of 2864 2780 omsecor.exe 35 PID 2780 wrote to memory of 2864 2780 omsecor.exe 35 PID 2780 wrote to memory of 2864 2780 omsecor.exe 35 PID 2780 wrote to memory of 2864 2780 omsecor.exe 35 PID 2864 wrote to memory of 1784 2864 omsecor.exe 36 PID 2864 wrote to memory of 1784 2864 omsecor.exe 36 PID 2864 wrote to memory of 1784 2864 omsecor.exe 36 PID 2864 wrote to memory of 1784 2864 omsecor.exe 36 PID 2864 wrote to memory of 1784 2864 omsecor.exe 36 PID 2864 wrote to memory of 1784 2864 omsecor.exe 36 PID 1784 wrote to memory of 1800 1784 omsecor.exe 37 PID 1784 wrote to memory of 1800 1784 omsecor.exe 37 PID 1784 wrote to memory of 1800 1784 omsecor.exe 37 PID 1784 wrote to memory of 1800 1784 omsecor.exe 37 PID 1800 wrote to memory of 2180 1800 omsecor.exe 38 PID 1800 wrote to memory of 2180 1800 omsecor.exe 38 PID 1800 wrote to memory of 2180 1800 omsecor.exe 38 PID 1800 wrote to memory of 2180 1800 omsecor.exe 38 PID 1800 wrote to memory of 2180 1800 omsecor.exe 38 PID 1800 wrote to memory of 2180 1800 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe"C:\Users\Admin\AppData\Local\Temp\3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exeC:\Users\Admin\AppData\Local\Temp\3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5910632cab3e18188b75277e7e4d7579b
SHA1292d3104cfa756375dba6e28ca599c4b8d2b3744
SHA25684b2e9c61b1e8abf53823d4128fbee4717aaa1ea2993a14342df447ea61a3d8d
SHA51219c96a7fa7400837f66cb8451309b23ca396d9450824040d1364fe57104aba01d7b635f14a59b487f6b259d90276145760577b54eea00e53e0107324849daa8e
-
Filesize
96KB
MD5b2786498879cad41e25fd398d087f6f5
SHA116aecfba3e67b37ea5d76ecc847fdba6547b30d4
SHA256d479dbabea15fef6676ccfbd50f216d14e17d1adce9e7d3e06275a6cd21f4daf
SHA512136db58aba94300dbb04248f352ee796b3e647982815ff8de956334b9637a4416f43ad7f635baa46bbf99f5f90761411a52eaa4f00ff5de54b652d45483d489b
-
Filesize
96KB
MD58560a86eca7da92a2adb4f5121b94163
SHA1fe6dff12a5b5dd49cae0e8a84b50451ee8c965b9
SHA256aa671df2d347736d85f68251f5704b9437c3114a11116b7a3886bfd8fe704ac0
SHA512b960465440d5bb9e7ac4acb9102f179f0f99b4affb8af9556a82b4129fa9676354ca34293fdfa9f6d0a39ff83f413782bd9565b399c4d6efe62f50c7bb8907ed