Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 13:34
Static task
static1
Behavioral task
behavioral1
Sample
07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe
Resource
win7-20241010-en
General
-
Target
07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe
-
Size
134KB
-
MD5
a651b6e2fbb0d58ae9472a2aa7110560
-
SHA1
69b4d97e581a4024a6e6dc1533c7de9c506ba717
-
SHA256
07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011
-
SHA512
80d1a79593cd8e103e6375fd8dc33361e92adce6514bb426d6157f0841a03a82b0dbccb9fffd7eaa818ddc73b64a9540ee0e8edb94315ac49aaeebcc5ee76bb3
-
SSDEEP
1536:ZDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:JiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4772 omsecor.exe 380 omsecor.exe 1852 omsecor.exe 4328 omsecor.exe 1864 omsecor.exe 972 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3288 set thread context of 2624 3288 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 82 PID 4772 set thread context of 380 4772 omsecor.exe 86 PID 1852 set thread context of 4328 1852 omsecor.exe 100 PID 1864 set thread context of 972 1864 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4432 3288 WerFault.exe 81 2788 4772 WerFault.exe 84 5004 1852 WerFault.exe 99 1824 1864 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3288 wrote to memory of 2624 3288 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 82 PID 3288 wrote to memory of 2624 3288 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 82 PID 3288 wrote to memory of 2624 3288 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 82 PID 3288 wrote to memory of 2624 3288 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 82 PID 3288 wrote to memory of 2624 3288 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 82 PID 2624 wrote to memory of 4772 2624 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 84 PID 2624 wrote to memory of 4772 2624 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 84 PID 2624 wrote to memory of 4772 2624 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 84 PID 4772 wrote to memory of 380 4772 omsecor.exe 86 PID 4772 wrote to memory of 380 4772 omsecor.exe 86 PID 4772 wrote to memory of 380 4772 omsecor.exe 86 PID 4772 wrote to memory of 380 4772 omsecor.exe 86 PID 4772 wrote to memory of 380 4772 omsecor.exe 86 PID 380 wrote to memory of 1852 380 omsecor.exe 99 PID 380 wrote to memory of 1852 380 omsecor.exe 99 PID 380 wrote to memory of 1852 380 omsecor.exe 99 PID 1852 wrote to memory of 4328 1852 omsecor.exe 100 PID 1852 wrote to memory of 4328 1852 omsecor.exe 100 PID 1852 wrote to memory of 4328 1852 omsecor.exe 100 PID 1852 wrote to memory of 4328 1852 omsecor.exe 100 PID 1852 wrote to memory of 4328 1852 omsecor.exe 100 PID 4328 wrote to memory of 1864 4328 omsecor.exe 102 PID 4328 wrote to memory of 1864 4328 omsecor.exe 102 PID 4328 wrote to memory of 1864 4328 omsecor.exe 102 PID 1864 wrote to memory of 972 1864 omsecor.exe 104 PID 1864 wrote to memory of 972 1864 omsecor.exe 104 PID 1864 wrote to memory of 972 1864 omsecor.exe 104 PID 1864 wrote to memory of 972 1864 omsecor.exe 104 PID 1864 wrote to memory of 972 1864 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe"C:\Users\Admin\AppData\Local\Temp\07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exeC:\Users\Admin\AppData\Local\Temp\07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 2528⤵
- Program crash
PID:1824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 2926⤵
- Program crash
PID:5004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 2884⤵
- Program crash
PID:2788
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 2882⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3288 -ip 32881⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4772 -ip 47721⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1852 -ip 18521⤵PID:4964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1864 -ip 18641⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD532396ad48ad93dabdeae804bdf2af045
SHA12371f3f29fb26f2a38c40d971a4cb8e2c71c4d95
SHA2566c572d88f543eac3a846b4ec5ee226638bf2b755548a119486d77e0aed647116
SHA5129d29f6349183e4e5316b38e7e24695d1f54df683640c460b0bb8245a6a1aa7564f4e4db97412eab80d4eb525404f4aef21bac0c9172d3d7292be35ada5cae7b1
-
Filesize
134KB
MD54cfc60cf8d866f8ed9a61c3d8eca5b73
SHA13df4dc2a340318d776357c4885141e79d224008b
SHA2561294949f6109a02328421cca2cb01fa528262fb757caeec6a76939fb351a7e7b
SHA512b0ca5c95f4b35a8eba0b5efc11386064a1175aefca2246caba937c9ccee0ddfde70dedb921a1a504673674d48c10793aeea6436f3d06be3b7a78c2a4b5eaf2e5
-
Filesize
134KB
MD50cb254636c59e367924a3cceff38fef2
SHA1920fdd279c082c4724bba5b102bd764a4caa4e40
SHA2566614872a6069f8753a928f786a28b0c28abdaa4cacb2889ab0622285053f9b00
SHA512584bd807debafc8594cc9b4271baf01dae19bcac6efeff2d77533c1c1769cbab6cf5366b1b60a2fffad8d529502f25139187f16091053958a539aacfde5c157a