Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 20:08
Static task
static1
Behavioral task
behavioral1
Sample
d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe
Resource
win7-20240903-en
General
-
Target
d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe
-
Size
96KB
-
MD5
cdf57d994164384fb8b40d761e0e8c20
-
SHA1
b5d25a35f2f60224e5428d74890b00bc42ba645c
-
SHA256
d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4af
-
SHA512
843a9b5f48c094854229c6ee3d775134b3fcdc0480f9b01677c40162aa375c5312febd6d54cd8446925481176c0774235fe5d78435ac6e540dfbe9fe2358a6b4
-
SSDEEP
1536:1nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:1Gs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2360 omsecor.exe 4756 omsecor.exe 4364 omsecor.exe 2664 omsecor.exe 4612 omsecor.exe 3712 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1664 set thread context of 4616 1664 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 83 PID 2360 set thread context of 4756 2360 omsecor.exe 88 PID 4364 set thread context of 2664 4364 omsecor.exe 109 PID 4612 set thread context of 3712 4612 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3096 1664 WerFault.exe 82 1360 2360 WerFault.exe 86 1448 4364 WerFault.exe 108 100 4612 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1664 wrote to memory of 4616 1664 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 83 PID 1664 wrote to memory of 4616 1664 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 83 PID 1664 wrote to memory of 4616 1664 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 83 PID 1664 wrote to memory of 4616 1664 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 83 PID 1664 wrote to memory of 4616 1664 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 83 PID 4616 wrote to memory of 2360 4616 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 86 PID 4616 wrote to memory of 2360 4616 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 86 PID 4616 wrote to memory of 2360 4616 d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe 86 PID 2360 wrote to memory of 4756 2360 omsecor.exe 88 PID 2360 wrote to memory of 4756 2360 omsecor.exe 88 PID 2360 wrote to memory of 4756 2360 omsecor.exe 88 PID 2360 wrote to memory of 4756 2360 omsecor.exe 88 PID 2360 wrote to memory of 4756 2360 omsecor.exe 88 PID 4756 wrote to memory of 4364 4756 omsecor.exe 108 PID 4756 wrote to memory of 4364 4756 omsecor.exe 108 PID 4756 wrote to memory of 4364 4756 omsecor.exe 108 PID 4364 wrote to memory of 2664 4364 omsecor.exe 109 PID 4364 wrote to memory of 2664 4364 omsecor.exe 109 PID 4364 wrote to memory of 2664 4364 omsecor.exe 109 PID 4364 wrote to memory of 2664 4364 omsecor.exe 109 PID 4364 wrote to memory of 2664 4364 omsecor.exe 109 PID 2664 wrote to memory of 4612 2664 omsecor.exe 111 PID 2664 wrote to memory of 4612 2664 omsecor.exe 111 PID 2664 wrote to memory of 4612 2664 omsecor.exe 111 PID 4612 wrote to memory of 3712 4612 omsecor.exe 113 PID 4612 wrote to memory of 3712 4612 omsecor.exe 113 PID 4612 wrote to memory of 3712 4612 omsecor.exe 113 PID 4612 wrote to memory of 3712 4612 omsecor.exe 113 PID 4612 wrote to memory of 3712 4612 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe"C:\Users\Admin\AppData\Local\Temp\d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exeC:\Users\Admin\AppData\Local\Temp\d567149e7f9db578098e549c133a64e5ef667e4d8d0162cc0dc8e4843df4f4afN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 2568⤵
- Program crash
PID:100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 2926⤵
- Program crash
PID:1448
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 2764⤵
- Program crash
PID:1360
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 2882⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1664 -ip 16641⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2360 -ip 23601⤵PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4364 -ip 43641⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4612 -ip 46121⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ec5d07ee974c26de1dd7050ae2ba8fc5
SHA15c31ef2e5d6f8479ad65c3d53b06100d75b5d1e1
SHA2560dc7d524386679e3dac3276fa84c0995f5b06786d0f696cb1df59640c39f53bb
SHA512898cef3d265ca52f07f86256933a6398d5fd8040aa4d594b214ba02fa6972c0cfb0acdffe9d5fe35303d53b5b8f61abd9d9659e315a8e827a65adb374f43549f
-
Filesize
96KB
MD5a003f7e5dadc9f7e7cc10eca393a630d
SHA1faada27f3f9a62b2a12d8c2462971adfb7e97fe2
SHA2567b999a329c49d47eac6a221b0abbdcf46b771055ce920dcb974310234ad15eac
SHA5121fd218dc22ccf1005c848fda7ef43dd280e6eb9e2f14ccc4e1aea7f18eb24bfb4362f59c9c8b079fb056b5682d64b4026b6d5f1701076de49761da087be41ef1
-
Filesize
96KB
MD556848973b70a49a623e55ced607b69fb
SHA191209950f8a76b09622541fc7d02b31caeb783b6
SHA2563090214693d65c6bd9401ed8130c9e3eb6208d096ce88e13bc90c9f1174b4ebb
SHA512d274bc274b5d62bace8d249ddbf3ffca7617f716a84e493057b5bc554bd2f7f6e8c6cdc8e2cfd6d7a8e83de9ac90b95751d9eab0002061cc162486f844fbdb90