Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe
Resource
win7-20250207-en
General
-
Target
80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe
-
Size
96KB
-
MD5
1011b6a6a9dc7eed3305f527326a7b60
-
SHA1
961a7453f04844e3de0b02e0ce143e6b5c8921bf
-
SHA256
80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040
-
SHA512
ea80d71204391a6c579172d43e76b711951efd70a14ca23654be91d2148ded3d38cc9d8b7d3a652a3af7df94ab2470650b58fad7b237ca0571aabb91f2501ee0
-
SSDEEP
1536:InAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:IGs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2516 omsecor.exe 2376 omsecor.exe 1976 omsecor.exe 1488 omsecor.exe 1832 omsecor.exe 2192 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2524 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 2524 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 2516 omsecor.exe 2376 omsecor.exe 2376 omsecor.exe 1488 omsecor.exe 1488 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2520 set thread context of 2524 2520 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 30 PID 2516 set thread context of 2376 2516 omsecor.exe 32 PID 1976 set thread context of 1488 1976 omsecor.exe 36 PID 1832 set thread context of 2192 1832 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2524 2520 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 30 PID 2520 wrote to memory of 2524 2520 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 30 PID 2520 wrote to memory of 2524 2520 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 30 PID 2520 wrote to memory of 2524 2520 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 30 PID 2520 wrote to memory of 2524 2520 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 30 PID 2520 wrote to memory of 2524 2520 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 30 PID 2524 wrote to memory of 2516 2524 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 31 PID 2524 wrote to memory of 2516 2524 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 31 PID 2524 wrote to memory of 2516 2524 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 31 PID 2524 wrote to memory of 2516 2524 80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe 31 PID 2516 wrote to memory of 2376 2516 omsecor.exe 32 PID 2516 wrote to memory of 2376 2516 omsecor.exe 32 PID 2516 wrote to memory of 2376 2516 omsecor.exe 32 PID 2516 wrote to memory of 2376 2516 omsecor.exe 32 PID 2516 wrote to memory of 2376 2516 omsecor.exe 32 PID 2516 wrote to memory of 2376 2516 omsecor.exe 32 PID 2376 wrote to memory of 1976 2376 omsecor.exe 35 PID 2376 wrote to memory of 1976 2376 omsecor.exe 35 PID 2376 wrote to memory of 1976 2376 omsecor.exe 35 PID 2376 wrote to memory of 1976 2376 omsecor.exe 35 PID 1976 wrote to memory of 1488 1976 omsecor.exe 36 PID 1976 wrote to memory of 1488 1976 omsecor.exe 36 PID 1976 wrote to memory of 1488 1976 omsecor.exe 36 PID 1976 wrote to memory of 1488 1976 omsecor.exe 36 PID 1976 wrote to memory of 1488 1976 omsecor.exe 36 PID 1976 wrote to memory of 1488 1976 omsecor.exe 36 PID 1488 wrote to memory of 1832 1488 omsecor.exe 37 PID 1488 wrote to memory of 1832 1488 omsecor.exe 37 PID 1488 wrote to memory of 1832 1488 omsecor.exe 37 PID 1488 wrote to memory of 1832 1488 omsecor.exe 37 PID 1832 wrote to memory of 2192 1832 omsecor.exe 38 PID 1832 wrote to memory of 2192 1832 omsecor.exe 38 PID 1832 wrote to memory of 2192 1832 omsecor.exe 38 PID 1832 wrote to memory of 2192 1832 omsecor.exe 38 PID 1832 wrote to memory of 2192 1832 omsecor.exe 38 PID 1832 wrote to memory of 2192 1832 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe"C:\Users\Admin\AppData\Local\Temp\80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exeC:\Users\Admin\AppData\Local\Temp\80eeacd11f15f15ce5a719cda91e260fc2b61c5a2e3c486ee4bf101132e3b040.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2192
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53a16c3286acd2c39effd385e0a4e0423
SHA1b194c2cc246387c7eb24b834c9660c6da6af54c1
SHA25606f9bc5cf54a4bde6aef9da1da94e29c79f79bc3e0ce474b472dcfa62b003876
SHA512ea8860a51cddbea0ca6924d4ec44c6d55aa8fb2fc5c137641b6440fac0739067967e1badb558a9337ca7922c8872e0f7581563f8c007a5a9df3988005ed6a3e6
-
Filesize
96KB
MD51ed3914cab8065dbd5591710200bdf17
SHA1683f66b2c7673a4188bab9c0fd8d97f0e3bb29a0
SHA25690851b16f0cdb1afb2216cd64334abc4eef8a07c25c5c9a8d3ac0b7fab0c53ee
SHA51218a806512198ab1743b5fd99e2bf8426ab2c0df22976ceb37dad22fb74e60ef126d300e8297abe1556417fea12a41e1f17b44847944b29c36a302283d6781821
-
Filesize
96KB
MD56230a525715155cf016ab231d6bef3f2
SHA10cdfed50b53ca45d9b5881841092e1b5ccef862c
SHA25679820afa2db1c5eb49dd62d8e7b2b19bce1f6759cbf1d45198c363080caa0099
SHA512abbe1ffb296b4009ede8a73445422ea14c319303d252c04bc087983e5f744dc500a305e102b6cac35bb6ead895212f66f8eefbd18779f8f0c7e7d6fcd6fd1bda