Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 15:37
Static task
static1
Behavioral task
behavioral1
Sample
30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe
Resource
win7-20240903-en
General
-
Target
30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe
-
Size
134KB
-
MD5
af5922b2a0fe5629a03231e9b22004d0
-
SHA1
3f2787307b8485d8dc43ad0a1a7bff05a01eec2a
-
SHA256
30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6
-
SHA512
19c258c9b424fcf84a53065d906f093e2b69607c3d0cecfca0f2814f12b91318bf71848d04b7081f8f7c2492d0d9d62358fae44ea285ec6ca368de8fe51296c6
-
SSDEEP
1536:aDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:8iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4740 omsecor.exe 4428 omsecor.exe 4572 omsecor.exe 2608 omsecor.exe 1996 omsecor.exe 1836 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4416 set thread context of 2252 4416 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 82 PID 4740 set thread context of 4428 4740 omsecor.exe 86 PID 4572 set thread context of 2608 4572 omsecor.exe 100 PID 1996 set thread context of 1836 1996 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 5000 4416 WerFault.exe 81 4972 4740 WerFault.exe 84 4760 4572 WerFault.exe 99 3460 1996 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2252 4416 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 82 PID 4416 wrote to memory of 2252 4416 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 82 PID 4416 wrote to memory of 2252 4416 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 82 PID 4416 wrote to memory of 2252 4416 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 82 PID 4416 wrote to memory of 2252 4416 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 82 PID 2252 wrote to memory of 4740 2252 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 84 PID 2252 wrote to memory of 4740 2252 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 84 PID 2252 wrote to memory of 4740 2252 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 84 PID 4740 wrote to memory of 4428 4740 omsecor.exe 86 PID 4740 wrote to memory of 4428 4740 omsecor.exe 86 PID 4740 wrote to memory of 4428 4740 omsecor.exe 86 PID 4740 wrote to memory of 4428 4740 omsecor.exe 86 PID 4740 wrote to memory of 4428 4740 omsecor.exe 86 PID 4428 wrote to memory of 4572 4428 omsecor.exe 99 PID 4428 wrote to memory of 4572 4428 omsecor.exe 99 PID 4428 wrote to memory of 4572 4428 omsecor.exe 99 PID 4572 wrote to memory of 2608 4572 omsecor.exe 100 PID 4572 wrote to memory of 2608 4572 omsecor.exe 100 PID 4572 wrote to memory of 2608 4572 omsecor.exe 100 PID 4572 wrote to memory of 2608 4572 omsecor.exe 100 PID 4572 wrote to memory of 2608 4572 omsecor.exe 100 PID 2608 wrote to memory of 1996 2608 omsecor.exe 102 PID 2608 wrote to memory of 1996 2608 omsecor.exe 102 PID 2608 wrote to memory of 1996 2608 omsecor.exe 102 PID 1996 wrote to memory of 1836 1996 omsecor.exe 103 PID 1996 wrote to memory of 1836 1996 omsecor.exe 103 PID 1996 wrote to memory of 1836 1996 omsecor.exe 103 PID 1996 wrote to memory of 1836 1996 omsecor.exe 103 PID 1996 wrote to memory of 1836 1996 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe"C:\Users\Admin\AppData\Local\Temp\30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exeC:\Users\Admin\AppData\Local\Temp\30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2688⤵
- Program crash
PID:3460
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 2926⤵
- Program crash
PID:4760
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 3004⤵
- Program crash
PID:4972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 2882⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4416 -ip 44161⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4740 -ip 47401⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4572 -ip 45721⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1996 -ip 19961⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f698787f7bc1a1b5619862264cbb6d6c
SHA1eb8e572c194f80af9849148cbd377bdaa573b867
SHA256c9bfcfffd883d347fb9d9cd935af417cf7a2dc00f8f4aa118c024149670045f4
SHA512185d34d7c44cd2588258687fbab9f360aef100875eb118829da95abcbba70dd128eed1ad7959831186161122c82a94d42beb5420be03218b970ee13f652731be
-
Filesize
134KB
MD5ba2ff0930883fc87340186a8542dd557
SHA16cc40130ba9d2c1fee1291a33b4a199fc2bd4dde
SHA2569c065d8f244bf88b7e2afd3ef26fed67aa70a1bf4613a047cc33823d90540b92
SHA51261ae807940339fef9340e40135ff1deb4646e517463d5576fb8967c4e88da3116484612dfe1ea27ad9fc207538ab47e52d1eccbbee6852e5c1d8fdcfbf9bf260
-
Filesize
134KB
MD57160d6491820d95e2f580eedc3821d43
SHA1257b0544d29b201983c103a3410289cba639ecfb
SHA256bf5ebfaf7949e613109108bfc78e5af6d548014f7356ab27b04bebc004ecf4c4
SHA51294d1661fbc04a75c06fa8814910e5ce46533be2a4809e37b56362f77dc203f89342cd08cef01cbf68f091bb9eeee2bb7e6866e4aedf62f86e24df3a02c432eb3