Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 19:37
Static task
static1
Behavioral task
behavioral1
Sample
9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe
Resource
win7-20241010-en
General
-
Target
9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe
-
Size
96KB
-
MD5
6fba36ee6a4b30872aceb83cb2a4c130
-
SHA1
24bb0d6e6156e752859729f8961807e75bca7028
-
SHA256
9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9
-
SHA512
5a1b0e4e33093138ac222986da291e4a2cf1c29d28b5cd96ccd8fdff3f4011320fcd6015e5200e6823d4999fb34c634f8a15ac1dbb2644356c985dc58e496d77
-
SSDEEP
1536:gnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:gGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2736 omsecor.exe 2324 omsecor.exe 3052 omsecor.exe 4324 omsecor.exe 2480 omsecor.exe 3332 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2800 set thread context of 2380 2800 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 83 PID 2736 set thread context of 2324 2736 omsecor.exe 87 PID 3052 set thread context of 4324 3052 omsecor.exe 108 PID 2480 set thread context of 3332 2480 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4560 2800 WerFault.exe 82 1920 2736 WerFault.exe 86 5088 3052 WerFault.exe 107 3888 2480 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2380 2800 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 83 PID 2800 wrote to memory of 2380 2800 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 83 PID 2800 wrote to memory of 2380 2800 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 83 PID 2800 wrote to memory of 2380 2800 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 83 PID 2800 wrote to memory of 2380 2800 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 83 PID 2380 wrote to memory of 2736 2380 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 86 PID 2380 wrote to memory of 2736 2380 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 86 PID 2380 wrote to memory of 2736 2380 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 86 PID 2736 wrote to memory of 2324 2736 omsecor.exe 87 PID 2736 wrote to memory of 2324 2736 omsecor.exe 87 PID 2736 wrote to memory of 2324 2736 omsecor.exe 87 PID 2736 wrote to memory of 2324 2736 omsecor.exe 87 PID 2736 wrote to memory of 2324 2736 omsecor.exe 87 PID 2324 wrote to memory of 3052 2324 omsecor.exe 107 PID 2324 wrote to memory of 3052 2324 omsecor.exe 107 PID 2324 wrote to memory of 3052 2324 omsecor.exe 107 PID 3052 wrote to memory of 4324 3052 omsecor.exe 108 PID 3052 wrote to memory of 4324 3052 omsecor.exe 108 PID 3052 wrote to memory of 4324 3052 omsecor.exe 108 PID 3052 wrote to memory of 4324 3052 omsecor.exe 108 PID 3052 wrote to memory of 4324 3052 omsecor.exe 108 PID 4324 wrote to memory of 2480 4324 omsecor.exe 110 PID 4324 wrote to memory of 2480 4324 omsecor.exe 110 PID 4324 wrote to memory of 2480 4324 omsecor.exe 110 PID 2480 wrote to memory of 3332 2480 omsecor.exe 112 PID 2480 wrote to memory of 3332 2480 omsecor.exe 112 PID 2480 wrote to memory of 3332 2480 omsecor.exe 112 PID 2480 wrote to memory of 3332 2480 omsecor.exe 112 PID 2480 wrote to memory of 3332 2480 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe"C:\Users\Admin\AppData\Local\Temp\9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exeC:\Users\Admin\AppData\Local\Temp\9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 2688⤵
- Program crash
PID:3888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2926⤵
- Program crash
PID:5088
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 2884⤵
- Program crash
PID:1920
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 2882⤵
- Program crash
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2800 -ip 28001⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2736 -ip 27361⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3052 -ip 30521⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2480 -ip 24801⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5dc91ce83d6aec2c5722df75b57117bcf
SHA1f73ca3182de38641c4e0fa6efb2ef222a4329883
SHA25648b1b56c93a3181a27e5d8588d3950e120f9889fa32b56231f42ee5b13957630
SHA512a51e18d2fc369cc4d7c77cf8523be68b0ec79133b38169e35a874d976f967a8f197aa20c05e629c999bcf93c8a21e8b90a3d5b096865a7b3d928bbdf505fd120
-
Filesize
96KB
MD52fda53bae1a990bd562c2b0fa6abf020
SHA1010478f5e1b2360977c63ac3b5b8718f0542c6a8
SHA256156761a4da091b2c24b114d7a918a1509a2f18adbf3ab77e391066b3c2a75d1e
SHA51294a50e6ea461a2c7fedce66e56a11f9ab9a518a4a9675cc065b554637b05a970c87742582bdff8e1d84c3b92f5eb241f31ff6da9963ef65c946e9eb697b2ece9
-
Filesize
96KB
MD53ddcf9d08bee551a1b936ec1f713157b
SHA103c729d8777135f4c8ef2f88fe8a943550e384e3
SHA2564195a5ea26a0f05e87146fe078a8ee512212e0edd7ca186a0bfa73430449881a
SHA512448c23cb5aa000e05e74f8c42b9262226a2fa25bd9dd256f482b9a75aa14052ed7b273fb85fe67b205d9b59849960705a617efa45537d307d3c623aaf45d11fd