Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe
Resource
win7-20241010-en
General
-
Target
e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe
-
Size
96KB
-
MD5
8e73e501734b63cb8cadc886e05bae70
-
SHA1
d605f1278198f3d02740ca868270a2291143aebb
-
SHA256
e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69c
-
SHA512
d1427314fe7609ec33a489cb5e6b13b1d1bba9e25b3b172b36de9e7db9b55c8c1db976e57789c094ec43ff0d0a8451173807a7b369954cf5fd6d4effd33bc61c
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:xGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2056 omsecor.exe 2016 omsecor.exe 2692 omsecor.exe 1364 omsecor.exe 1484 omsecor.exe 3020 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2360 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 2360 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 2056 omsecor.exe 2016 omsecor.exe 2016 omsecor.exe 1364 omsecor.exe 1364 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3032 set thread context of 2360 3032 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 30 PID 2056 set thread context of 2016 2056 omsecor.exe 32 PID 2692 set thread context of 1364 2692 omsecor.exe 36 PID 1484 set thread context of 3020 1484 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2360 3032 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 30 PID 3032 wrote to memory of 2360 3032 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 30 PID 3032 wrote to memory of 2360 3032 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 30 PID 3032 wrote to memory of 2360 3032 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 30 PID 3032 wrote to memory of 2360 3032 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 30 PID 3032 wrote to memory of 2360 3032 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 30 PID 2360 wrote to memory of 2056 2360 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 31 PID 2360 wrote to memory of 2056 2360 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 31 PID 2360 wrote to memory of 2056 2360 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 31 PID 2360 wrote to memory of 2056 2360 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 31 PID 2056 wrote to memory of 2016 2056 omsecor.exe 32 PID 2056 wrote to memory of 2016 2056 omsecor.exe 32 PID 2056 wrote to memory of 2016 2056 omsecor.exe 32 PID 2056 wrote to memory of 2016 2056 omsecor.exe 32 PID 2056 wrote to memory of 2016 2056 omsecor.exe 32 PID 2056 wrote to memory of 2016 2056 omsecor.exe 32 PID 2016 wrote to memory of 2692 2016 omsecor.exe 35 PID 2016 wrote to memory of 2692 2016 omsecor.exe 35 PID 2016 wrote to memory of 2692 2016 omsecor.exe 35 PID 2016 wrote to memory of 2692 2016 omsecor.exe 35 PID 2692 wrote to memory of 1364 2692 omsecor.exe 36 PID 2692 wrote to memory of 1364 2692 omsecor.exe 36 PID 2692 wrote to memory of 1364 2692 omsecor.exe 36 PID 2692 wrote to memory of 1364 2692 omsecor.exe 36 PID 2692 wrote to memory of 1364 2692 omsecor.exe 36 PID 2692 wrote to memory of 1364 2692 omsecor.exe 36 PID 1364 wrote to memory of 1484 1364 omsecor.exe 37 PID 1364 wrote to memory of 1484 1364 omsecor.exe 37 PID 1364 wrote to memory of 1484 1364 omsecor.exe 37 PID 1364 wrote to memory of 1484 1364 omsecor.exe 37 PID 1484 wrote to memory of 3020 1484 omsecor.exe 38 PID 1484 wrote to memory of 3020 1484 omsecor.exe 38 PID 1484 wrote to memory of 3020 1484 omsecor.exe 38 PID 1484 wrote to memory of 3020 1484 omsecor.exe 38 PID 1484 wrote to memory of 3020 1484 omsecor.exe 38 PID 1484 wrote to memory of 3020 1484 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe"C:\Users\Admin\AppData\Local\Temp\e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exeC:\Users\Admin\AppData\Local\Temp\e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d8c0e1c5a971133e0cbe438ffcb30bee
SHA15b3639ad77f2b10c830fd59abef6fb2c115e0bfb
SHA256b630987f421f1e58ec328d6318f95490cce964193368739782bf4707817e03c6
SHA51208af07b11a9d8a078056015813c3827ad81ba154c891399c798c81b6ddf725a9bc5eea9786f9771f30d7b4fcaea40862b10947515dfba5c572a5abb129b10bc3
-
Filesize
96KB
MD5207ae8d494d419f23792c3f7810a370e
SHA1a48a2568b776dcda6975984db54dffc5ded2cf97
SHA2565569c8e9579287da6ba58d5541d46a92ffbc63290ceeb7b649904823ac591ae0
SHA512de303068d2c756fe48bfdc8f0e97673459d78f8b27bf199a53f0e200034844b2b3ad23f002ef25efcb46a177c1d8c7482d845f3b93e9ab9ca4c4853162770889
-
Filesize
96KB
MD5cf62575dd388ef0eede3fea177b975d3
SHA1884a4cefec404d2c5f116426086b071666bcb9a3
SHA256b66bd7eb26b8bab07b7f1d840c6b502a5c917ab066931ffd1706be4197946a97
SHA5129a7c1ed00a8133a606ce888695ee1cac1483f461086a8acc5369c5b357207297a970ac75e0e21ac1d8b3fe3821e16312c534286e6f94d40147382048b371b600