Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 01:27
Static task
static1
Behavioral task
behavioral1
Sample
7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe
Resource
win7-20241010-en
General
-
Target
7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe
-
Size
134KB
-
MD5
f3236833d3d417f40dd700787185aab0
-
SHA1
e684ee297a24a73109418bca4c6e97e40ab0d0c3
-
SHA256
7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97
-
SHA512
4e4303106ed847d1f34da5b58d63d83bc75160a589365ce975c2cfa834d7d792b42b1e9d39f6772933fb4cf00a26ee71e8c7faf964b3270cc726a064079b88d6
-
SSDEEP
1536:zDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi9:/iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3128 omsecor.exe 220 omsecor.exe 2396 omsecor.exe 2772 omsecor.exe 1848 omsecor.exe 112 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2036 set thread context of 1468 2036 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 83 PID 3128 set thread context of 220 3128 omsecor.exe 88 PID 2396 set thread context of 2772 2396 omsecor.exe 107 PID 1848 set thread context of 112 1848 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 1592 2036 WerFault.exe 82 4820 3128 WerFault.exe 85 3944 2396 WerFault.exe 106 3608 1848 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1468 2036 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 83 PID 2036 wrote to memory of 1468 2036 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 83 PID 2036 wrote to memory of 1468 2036 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 83 PID 2036 wrote to memory of 1468 2036 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 83 PID 2036 wrote to memory of 1468 2036 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 83 PID 1468 wrote to memory of 3128 1468 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 85 PID 1468 wrote to memory of 3128 1468 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 85 PID 1468 wrote to memory of 3128 1468 7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe 85 PID 3128 wrote to memory of 220 3128 omsecor.exe 88 PID 3128 wrote to memory of 220 3128 omsecor.exe 88 PID 3128 wrote to memory of 220 3128 omsecor.exe 88 PID 3128 wrote to memory of 220 3128 omsecor.exe 88 PID 3128 wrote to memory of 220 3128 omsecor.exe 88 PID 220 wrote to memory of 2396 220 omsecor.exe 106 PID 220 wrote to memory of 2396 220 omsecor.exe 106 PID 220 wrote to memory of 2396 220 omsecor.exe 106 PID 2396 wrote to memory of 2772 2396 omsecor.exe 107 PID 2396 wrote to memory of 2772 2396 omsecor.exe 107 PID 2396 wrote to memory of 2772 2396 omsecor.exe 107 PID 2396 wrote to memory of 2772 2396 omsecor.exe 107 PID 2396 wrote to memory of 2772 2396 omsecor.exe 107 PID 2772 wrote to memory of 1848 2772 omsecor.exe 109 PID 2772 wrote to memory of 1848 2772 omsecor.exe 109 PID 2772 wrote to memory of 1848 2772 omsecor.exe 109 PID 1848 wrote to memory of 112 1848 omsecor.exe 111 PID 1848 wrote to memory of 112 1848 omsecor.exe 111 PID 1848 wrote to memory of 112 1848 omsecor.exe 111 PID 1848 wrote to memory of 112 1848 omsecor.exe 111 PID 1848 wrote to memory of 112 1848 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe"C:\Users\Admin\AppData\Local\Temp\7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exeC:\Users\Admin\AppData\Local\Temp\7591c03af22b1830f46fa67da59a16c6977a9bad8637732fa49d551b6690ba97N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 2688⤵
- Program crash
PID:3608
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 2926⤵
- Program crash
PID:3944
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 3004⤵
- Program crash
PID:4820
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 2882⤵
- Program crash
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2036 -ip 20361⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3128 -ip 31281⤵PID:208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2396 -ip 23961⤵PID:1064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1848 -ip 18481⤵PID:1428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5498a00fda1de74773ec11072646c902b
SHA1bb263d654e0b1f37ba0ec1ba73f278c8d4849550
SHA256cf410289153a9e0d8de4a4aa0491de10c8f0b8fe98b0acc4bd62bc36603592d2
SHA512266dc2b6a180a4d5086222b15bce3fae1234433fb12cc633fd103c3dfe141c9e2fb918f761d53c6522956f98891f68c6de82ec3c46c352bc9fa6475d492d3fe5
-
Filesize
134KB
MD579c07d52b61cf79ccb5609b6eeee28e4
SHA14b703c0e789e2098844bd0b209511e5cf0fe26b4
SHA25601c70992e58e97fad6a93ba2321d018132a7bc973cecfcefcd5692d9cf644a4e
SHA512b8a0490a28611c2aca5e29d8a52adf451dfacf30a177629b0503586ac830e0ce9f8d000e1cb5f02d9bc8bea03e9a0d3fbef975ab80f9dc4a17f6811163c7795b
-
Filesize
134KB
MD547cff9002c277a6f98cd63b9b64adb29
SHA1feb727b861b02e3a4eec3a868d85e6d0bf25e180
SHA25663df98d5ed0eed1e06d249b1afe162b39bd599e76cfd0b3d27d8309c127e759d
SHA51222342c387446af47b3fb8ab5a8923fc572f38fae68e3c9d456c1fb2ee016775a2058472eb726520234923f8330016b977547652466dc016bd5335a2e50e9e1bc