Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 10:34
Static task
static1
Behavioral task
behavioral1
Sample
25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe
Resource
win7-20240903-en
General
-
Target
25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe
-
Size
96KB
-
MD5
82a3064afc256638a9bc8609d7b04f20
-
SHA1
dc8fcf3de8dc90c81656256f402e159074a0a9b1
-
SHA256
25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0
-
SHA512
957c1028ed7350bfc7d7108be87bbe5ada1aad159895b29c6c18e12da7478525da5c04dc7d5e917bcab5383be9a7d713cf33a201d47024a6e80bb992e5605677
-
SSDEEP
1536:2nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:2Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4496 omsecor.exe 4608 omsecor.exe 3632 omsecor.exe 788 omsecor.exe 4204 omsecor.exe 1676 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1916 set thread context of 1984 1916 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 82 PID 4496 set thread context of 4608 4496 omsecor.exe 86 PID 3632 set thread context of 788 3632 omsecor.exe 100 PID 4204 set thread context of 1676 4204 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 1460 1916 WerFault.exe 81 2932 4496 WerFault.exe 85 4872 3632 WerFault.exe 99 4128 4204 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1984 1916 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 82 PID 1916 wrote to memory of 1984 1916 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 82 PID 1916 wrote to memory of 1984 1916 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 82 PID 1916 wrote to memory of 1984 1916 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 82 PID 1916 wrote to memory of 1984 1916 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 82 PID 1984 wrote to memory of 4496 1984 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 85 PID 1984 wrote to memory of 4496 1984 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 85 PID 1984 wrote to memory of 4496 1984 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 85 PID 4496 wrote to memory of 4608 4496 omsecor.exe 86 PID 4496 wrote to memory of 4608 4496 omsecor.exe 86 PID 4496 wrote to memory of 4608 4496 omsecor.exe 86 PID 4496 wrote to memory of 4608 4496 omsecor.exe 86 PID 4496 wrote to memory of 4608 4496 omsecor.exe 86 PID 4608 wrote to memory of 3632 4608 omsecor.exe 99 PID 4608 wrote to memory of 3632 4608 omsecor.exe 99 PID 4608 wrote to memory of 3632 4608 omsecor.exe 99 PID 3632 wrote to memory of 788 3632 omsecor.exe 100 PID 3632 wrote to memory of 788 3632 omsecor.exe 100 PID 3632 wrote to memory of 788 3632 omsecor.exe 100 PID 3632 wrote to memory of 788 3632 omsecor.exe 100 PID 3632 wrote to memory of 788 3632 omsecor.exe 100 PID 788 wrote to memory of 4204 788 omsecor.exe 102 PID 788 wrote to memory of 4204 788 omsecor.exe 102 PID 788 wrote to memory of 4204 788 omsecor.exe 102 PID 4204 wrote to memory of 1676 4204 omsecor.exe 104 PID 4204 wrote to memory of 1676 4204 omsecor.exe 104 PID 4204 wrote to memory of 1676 4204 omsecor.exe 104 PID 4204 wrote to memory of 1676 4204 omsecor.exe 104 PID 4204 wrote to memory of 1676 4204 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe"C:\Users\Admin\AppData\Local\Temp\25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exeC:\Users\Admin\AppData\Local\Temp\25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 2568⤵
- Program crash
PID:4128
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 2926⤵
- Program crash
PID:4872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 3004⤵
- Program crash
PID:2932
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 2882⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1916 -ip 19161⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4496 -ip 44961⤵PID:3852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3632 -ip 36321⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4204 -ip 42041⤵PID:1876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5175ff8613e46b0ed394f0c289179cebf
SHA1f17a7e2b05febe8b28f6f6c74d9d8d2f39621599
SHA25691a72c6d342189658464e647acb222eeadbedb4e019ccc77d12947c27eac2c3f
SHA512d1104fef152d60d470ea7457ac1de592c848a7c33dce6729ea15f289eaf81bcffe8e7e514acfd2454ca5b3c1410d3a8e351caa472df3eaf4d32fbe7d2a5b31b7
-
Filesize
96KB
MD5b32ba694853f4cd17354a0f8919698fa
SHA1afb87ed6b396700bf3eeb71c0acc8cea963ede0c
SHA25645f6f8cd971e2b06caf21106a7f9472e1aede8bf9f48a54199a05c069e075707
SHA512eb92a7b2f0f1b8c70dc52628f8bc9d7995077ea7c74b138b75b319ab543b23af55cf21ac8d702f4c810caf65a604a2aee4052ef824d549393613c9b2e2f3913b
-
Filesize
96KB
MD5da0281ce2a1a851b4e14f544bef6fa17
SHA13c6609bd588de794a9d3d336c28eddde7fdf15d2
SHA2566ccb5c584f1c0c83297c4dea362e5293b14d6f8776b49e9e900d09c7d51f26fa
SHA5124f09488256df2bc858e002ab222be942c79257297fcf29c74faf6e87d43650d10c7e0f89114aa04582a2617b4ab486dd46696633c8ee3fe7c1d7b6fb66d08f8c