Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 17:57
Static task
static1
Behavioral task
behavioral1
Sample
dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe
Resource
win7-20240903-en
General
-
Target
dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe
-
Size
96KB
-
MD5
82bbb006b062bb4abcfa4f23d8657960
-
SHA1
4fed425c1d5f832e8996c3c877ba2933a5d904c5
-
SHA256
dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469
-
SHA512
55710cbe8106aa67755e57323d8731c0dea40717a54ce66f0aee9ece962e21bae86117d0eb5d9c430c5b3ac9b39f0a7cca620f59f70beb2facc2331e1d32e1d6
-
SSDEEP
1536:SnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:SGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 720 omsecor.exe 3408 omsecor.exe 3932 omsecor.exe 4460 omsecor.exe 4168 omsecor.exe 3132 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3412 set thread context of 2848 3412 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 83 PID 720 set thread context of 3408 720 omsecor.exe 88 PID 3932 set thread context of 4460 3932 omsecor.exe 107 PID 4168 set thread context of 3132 4168 omsecor.exe 110 -
Program crash 4 IoCs
pid pid_target Process procid_target 684 3412 WerFault.exe 82 2896 720 WerFault.exe 86 3508 3932 WerFault.exe 106 3148 4168 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3412 wrote to memory of 2848 3412 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 83 PID 3412 wrote to memory of 2848 3412 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 83 PID 3412 wrote to memory of 2848 3412 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 83 PID 3412 wrote to memory of 2848 3412 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 83 PID 3412 wrote to memory of 2848 3412 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 83 PID 2848 wrote to memory of 720 2848 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 86 PID 2848 wrote to memory of 720 2848 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 86 PID 2848 wrote to memory of 720 2848 dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe 86 PID 720 wrote to memory of 3408 720 omsecor.exe 88 PID 720 wrote to memory of 3408 720 omsecor.exe 88 PID 720 wrote to memory of 3408 720 omsecor.exe 88 PID 720 wrote to memory of 3408 720 omsecor.exe 88 PID 720 wrote to memory of 3408 720 omsecor.exe 88 PID 3408 wrote to memory of 3932 3408 omsecor.exe 106 PID 3408 wrote to memory of 3932 3408 omsecor.exe 106 PID 3408 wrote to memory of 3932 3408 omsecor.exe 106 PID 3932 wrote to memory of 4460 3932 omsecor.exe 107 PID 3932 wrote to memory of 4460 3932 omsecor.exe 107 PID 3932 wrote to memory of 4460 3932 omsecor.exe 107 PID 3932 wrote to memory of 4460 3932 omsecor.exe 107 PID 3932 wrote to memory of 4460 3932 omsecor.exe 107 PID 4460 wrote to memory of 4168 4460 omsecor.exe 109 PID 4460 wrote to memory of 4168 4460 omsecor.exe 109 PID 4460 wrote to memory of 4168 4460 omsecor.exe 109 PID 4168 wrote to memory of 3132 4168 omsecor.exe 110 PID 4168 wrote to memory of 3132 4168 omsecor.exe 110 PID 4168 wrote to memory of 3132 4168 omsecor.exe 110 PID 4168 wrote to memory of 3132 4168 omsecor.exe 110 PID 4168 wrote to memory of 3132 4168 omsecor.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe"C:\Users\Admin\AppData\Local\Temp\dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exeC:\Users\Admin\AppData\Local\Temp\dbe28c1e7ed67ebaacd6e85f0189356720badc2839c932b0320ff9b6f94bb469N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 2688⤵
- Program crash
PID:3148
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 2926⤵
- Program crash
PID:3508
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 2884⤵
- Program crash
PID:2896
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3412 -s 2722⤵
- Program crash
PID:684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3412 -ip 34121⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 720 -ip 7201⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3932 -ip 39321⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4168 -ip 41681⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD521a22f77f94ff9960ee5ade756459a6d
SHA1591b9e1011dbcbcc85b283fd5a02e6b654cd208e
SHA256924732477665453406ba8cbcbb9da34d69e224c707615e65b50ffb3a8a6f939e
SHA51247c6d10fc3de7085b3d7fc96b0d5ea9390085f4df2246d23a67792ebef5347b866ba4a94bb76467a8cdd55a8b6d29d451254f82b8f778ce13c7df4cf410e2248
-
Filesize
96KB
MD53edac1da41bc9aeb4052369a2341c5fc
SHA15bc0065137eb37b6c35c919f22ae3496ddf99b85
SHA256059e5d91effe675a6e2d5b8943397217b55a6fe810b49887f567b6e80c0db780
SHA512f95bbbfaa390df819abd3a3a470c187ab4e43e3a216914d0a0907385075565994b8bf4ae5b09f84f630e397c4334fea9cf50c86ea4cfcf05433d63cf35ecea72
-
Filesize
96KB
MD5923e032527e275bcfe0392c7a337797b
SHA1bf33c172cac7779e2cf4860c667b7cc20f3d8686
SHA2560742a52077f022ac0d0f7d090cdd177ce20e4fbd93639a70b4b0ce8d1dc4df3f
SHA5120389f3b2a5583a63a101e58d42623b7b2261bbb8485de68e372ffb04e1843cc872be1a3b238b88e6806aad2184a531a5802bfec67e2eac2ca5fa8bbf39e25845