Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 00:21
Static task
static1
Behavioral task
behavioral1
Sample
6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe
Resource
win7-20241010-en
General
-
Target
6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe
-
Size
96KB
-
MD5
45ec69aea194e3c952bf2bb1e2831a13
-
SHA1
23700639bd45852d86460434e69b1d73331c07f1
-
SHA256
6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95
-
SHA512
e66ffcbaf83a8966e08dd3e2e0727caeac1df91b220841fb40a72a36dc538a28c79a45010582e7c31f62c7bcb078a347587396be8aa11b818ff1ef4d5b9e1920
-
SSDEEP
1536:BnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:BGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4376 omsecor.exe 2088 omsecor.exe 1436 omsecor.exe 1456 omsecor.exe 1980 omsecor.exe 1488 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4816 set thread context of 1212 4816 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 83 PID 4376 set thread context of 2088 4376 omsecor.exe 88 PID 1436 set thread context of 1456 1436 omsecor.exe 110 PID 1980 set thread context of 1488 1980 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 3944 4816 WerFault.exe 82 452 4376 WerFault.exe 85 3312 1436 WerFault.exe 109 2612 1980 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4816 wrote to memory of 1212 4816 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 83 PID 4816 wrote to memory of 1212 4816 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 83 PID 4816 wrote to memory of 1212 4816 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 83 PID 4816 wrote to memory of 1212 4816 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 83 PID 4816 wrote to memory of 1212 4816 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 83 PID 1212 wrote to memory of 4376 1212 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 85 PID 1212 wrote to memory of 4376 1212 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 85 PID 1212 wrote to memory of 4376 1212 6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe 85 PID 4376 wrote to memory of 2088 4376 omsecor.exe 88 PID 4376 wrote to memory of 2088 4376 omsecor.exe 88 PID 4376 wrote to memory of 2088 4376 omsecor.exe 88 PID 4376 wrote to memory of 2088 4376 omsecor.exe 88 PID 4376 wrote to memory of 2088 4376 omsecor.exe 88 PID 2088 wrote to memory of 1436 2088 omsecor.exe 109 PID 2088 wrote to memory of 1436 2088 omsecor.exe 109 PID 2088 wrote to memory of 1436 2088 omsecor.exe 109 PID 1436 wrote to memory of 1456 1436 omsecor.exe 110 PID 1436 wrote to memory of 1456 1436 omsecor.exe 110 PID 1436 wrote to memory of 1456 1436 omsecor.exe 110 PID 1436 wrote to memory of 1456 1436 omsecor.exe 110 PID 1436 wrote to memory of 1456 1436 omsecor.exe 110 PID 1456 wrote to memory of 1980 1456 omsecor.exe 112 PID 1456 wrote to memory of 1980 1456 omsecor.exe 112 PID 1456 wrote to memory of 1980 1456 omsecor.exe 112 PID 1980 wrote to memory of 1488 1980 omsecor.exe 114 PID 1980 wrote to memory of 1488 1980 omsecor.exe 114 PID 1980 wrote to memory of 1488 1980 omsecor.exe 114 PID 1980 wrote to memory of 1488 1980 omsecor.exe 114 PID 1980 wrote to memory of 1488 1980 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe"C:\Users\Admin\AppData\Local\Temp\6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exeC:\Users\Admin\AppData\Local\Temp\6f4a44c7d35ba1af57e115c6f7b32b693e08cb6d777aba72a6d46c93141d3c95.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 2568⤵
- Program crash
PID:2612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 2926⤵
- Program crash
PID:3312
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 2884⤵
- Program crash
PID:452
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 2882⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4816 -ip 48161⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4376 -ip 43761⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1436 -ip 14361⤵PID:5108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1980 -ip 19801⤵PID:3944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5032ce4310feadebfd660b360c7324c7a
SHA1085200ea9062c962db5638ba25feb5c353db791d
SHA256e367418799cb7d5ce0b9033ef381cdb857c34015c633b891a1f50ccef4fa22df
SHA51230795916f73b4196c50f7966dda0ce6e3df627dedb7230ab3aa0b1a9067e75ac0656f8d71c61094d58835a8d093f3880aaecaf4cae15fdb587f3ea2dfaeb6fab
-
Filesize
96KB
MD588d6414aa6867b7da027e3496160fb7d
SHA11bdfb04b9178812578e1a517decf66f27da75494
SHA256c68d95abba7ae2eacf469ff26cec3fb637fa592aa94187ac2b995f657ef5777d
SHA512a3ac2e5be84a41f5d76c9514b23dc615c0d0e13df252ecd7e6354d20530768f9ed49b255895ae6df584f83f14cfae540587b528522f084cb2b1662d92be3c577
-
Filesize
96KB
MD5c443f1587c05a0e6ee780cb71da6884d
SHA1d8b6a8a06a8011fd6404a8159d0ce1e0c9166fe3
SHA2569ebb4c2afc2f5b5f3c9b0fc04576bd03aad8987008907b9e7c02ca59b95aa24d
SHA5129418b5ac4a0530f5aa4e95837a5c7c1026200497c1e333cc8a1412428c9b40e7d94a23f0b8bf12584898cc9e791b5da7570132cc5bcf08b957de432e2a2a20dc