Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2025, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe
Resource
win7-20240903-en
General
-
Target
7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe
-
Size
96KB
-
MD5
25010824fed38e2ca5cba1fad94fb28c
-
SHA1
4c571f8c16026f1223812598ce38654a9f7d5bf6
-
SHA256
7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0
-
SHA512
c6e4c68647d39c09920c29769f96182634e21c53f92e5e1e05004c8220c04a5a17a8f03fc1dc1bf2ea116c5bb5ad73d299014740ac8936565869c8f81df805ea
-
SSDEEP
1536:1nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:1Gs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 888 omsecor.exe 4700 omsecor.exe 4708 omsecor.exe 2648 omsecor.exe 1396 omsecor.exe 2256 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3756 set thread context of 776 3756 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 82 PID 888 set thread context of 4700 888 omsecor.exe 86 PID 4708 set thread context of 2648 4708 omsecor.exe 100 PID 1396 set thread context of 2256 1396 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 2160 3756 WerFault.exe 81 496 888 WerFault.exe 84 4376 4708 WerFault.exe 99 4132 1396 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3756 wrote to memory of 776 3756 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 82 PID 3756 wrote to memory of 776 3756 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 82 PID 3756 wrote to memory of 776 3756 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 82 PID 3756 wrote to memory of 776 3756 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 82 PID 3756 wrote to memory of 776 3756 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 82 PID 776 wrote to memory of 888 776 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 84 PID 776 wrote to memory of 888 776 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 84 PID 776 wrote to memory of 888 776 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 84 PID 888 wrote to memory of 4700 888 omsecor.exe 86 PID 888 wrote to memory of 4700 888 omsecor.exe 86 PID 888 wrote to memory of 4700 888 omsecor.exe 86 PID 888 wrote to memory of 4700 888 omsecor.exe 86 PID 888 wrote to memory of 4700 888 omsecor.exe 86 PID 4700 wrote to memory of 4708 4700 omsecor.exe 99 PID 4700 wrote to memory of 4708 4700 omsecor.exe 99 PID 4700 wrote to memory of 4708 4700 omsecor.exe 99 PID 4708 wrote to memory of 2648 4708 omsecor.exe 100 PID 4708 wrote to memory of 2648 4708 omsecor.exe 100 PID 4708 wrote to memory of 2648 4708 omsecor.exe 100 PID 4708 wrote to memory of 2648 4708 omsecor.exe 100 PID 4708 wrote to memory of 2648 4708 omsecor.exe 100 PID 2648 wrote to memory of 1396 2648 omsecor.exe 102 PID 2648 wrote to memory of 1396 2648 omsecor.exe 102 PID 2648 wrote to memory of 1396 2648 omsecor.exe 102 PID 1396 wrote to memory of 2256 1396 omsecor.exe 103 PID 1396 wrote to memory of 2256 1396 omsecor.exe 103 PID 1396 wrote to memory of 2256 1396 omsecor.exe 103 PID 1396 wrote to memory of 2256 1396 omsecor.exe 103 PID 1396 wrote to memory of 2256 1396 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe"C:\Users\Admin\AppData\Local\Temp\7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exeC:\Users\Admin\AppData\Local\Temp\7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 2568⤵
- Program crash
PID:4132
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 2926⤵
- Program crash
PID:4376
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 888 -s 2964⤵
- Program crash
PID:496
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 2882⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3756 -ip 37561⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 888 -ip 8881⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4708 -ip 47081⤵PID:3012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1396 -ip 13961⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52812242c302c354c9c402e34e0776cee
SHA16b32283d738c2bcd7a54f725112bc2cf8943c3de
SHA256af73dfd0c5fc49bc13cb8ad5f2337b456b95300707470479830efbd231733a58
SHA51253f62b8e1dee47c862de63324b218f7a0f9c20db50e8e2b471dc95228bd36ec0c5c9f4edc0fb9a8768c3a790fb3811e8930a0bfb0fa51cbe1b1b386f22db2a07
-
Filesize
96KB
MD5b40f2d66eecd5c396c94bc245d0c13fe
SHA1b2dca0ec48fe62dc3819cc063ddb04fc80925e24
SHA2564fadda8f37a7732dd377cb48a99b681fbbc6fde23ec8c55ccfd3ed0669edb27b
SHA512568a86b4efaca2698fed072c8530a70d7b4a88c25efafefbf046ff0ea08439530b7b141b2ef3d93e397ec77b31303959ccae5b3622e89b5013d2d150ef7eb279
-
Filesize
96KB
MD52dd008418228a80c47a465018d57cca3
SHA1c6669c4b700400116bf1ff5b24efc0a75e4ae9b7
SHA256127ef556144f81576b17372028e96c358e41be0b42235f4b71f64e35dfeddd14
SHA512bef281c8c168a1a6e2844c48f0d169f168b83b85362471f1604523da96fa99f5cdc1339bddbfdd9f46e13a299cd68caf39749ef1994c6dbcfb094325b6bf4e68