Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 05:10
Static task
static1
Behavioral task
behavioral1
Sample
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe
Resource
win7-20241023-en
General
-
Target
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe
-
Size
134KB
-
MD5
0d00526946b84d34a807a350500ce952
-
SHA1
6142c3bedab608c18b2b35572541a1047a63abe0
-
SHA256
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e
-
SHA512
8aaa25fbe22a86b589495be5ffedb93640e326e587ebd0c1bd6f066d0ade720306ccde6373bd0ec813990c92cf5ef7f87c809bd749222198f0f1db3eef9cb3f1
-
SSDEEP
1536:bDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi9:XiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1324 omsecor.exe 4948 omsecor.exe 860 omsecor.exe 2332 omsecor.exe 3116 omsecor.exe 4276 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4576 set thread context of 2804 4576 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 82 PID 1324 set thread context of 4948 1324 omsecor.exe 86 PID 860 set thread context of 2332 860 omsecor.exe 100 PID 3116 set thread context of 4276 3116 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3304 4576 WerFault.exe 81 904 1324 WerFault.exe 85 1080 860 WerFault.exe 99 4840 3116 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4576 wrote to memory of 2804 4576 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 82 PID 4576 wrote to memory of 2804 4576 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 82 PID 4576 wrote to memory of 2804 4576 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 82 PID 4576 wrote to memory of 2804 4576 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 82 PID 4576 wrote to memory of 2804 4576 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 82 PID 2804 wrote to memory of 1324 2804 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 85 PID 2804 wrote to memory of 1324 2804 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 85 PID 2804 wrote to memory of 1324 2804 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 85 PID 1324 wrote to memory of 4948 1324 omsecor.exe 86 PID 1324 wrote to memory of 4948 1324 omsecor.exe 86 PID 1324 wrote to memory of 4948 1324 omsecor.exe 86 PID 1324 wrote to memory of 4948 1324 omsecor.exe 86 PID 1324 wrote to memory of 4948 1324 omsecor.exe 86 PID 4948 wrote to memory of 860 4948 omsecor.exe 99 PID 4948 wrote to memory of 860 4948 omsecor.exe 99 PID 4948 wrote to memory of 860 4948 omsecor.exe 99 PID 860 wrote to memory of 2332 860 omsecor.exe 100 PID 860 wrote to memory of 2332 860 omsecor.exe 100 PID 860 wrote to memory of 2332 860 omsecor.exe 100 PID 860 wrote to memory of 2332 860 omsecor.exe 100 PID 860 wrote to memory of 2332 860 omsecor.exe 100 PID 2332 wrote to memory of 3116 2332 omsecor.exe 102 PID 2332 wrote to memory of 3116 2332 omsecor.exe 102 PID 2332 wrote to memory of 3116 2332 omsecor.exe 102 PID 3116 wrote to memory of 4276 3116 omsecor.exe 104 PID 3116 wrote to memory of 4276 3116 omsecor.exe 104 PID 3116 wrote to memory of 4276 3116 omsecor.exe 104 PID 3116 wrote to memory of 4276 3116 omsecor.exe 104 PID 3116 wrote to memory of 4276 3116 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe"C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exeC:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 2568⤵
- Program crash
PID:4840
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 2926⤵
- Program crash
PID:1080
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 2884⤵
- Program crash
PID:904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 2882⤵
- Program crash
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4576 -ip 45761⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1324 -ip 13241⤵PID:2364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 860 -ip 8601⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3116 -ip 31161⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD59f0bb8e8449537e47f9edeb61bbdd633
SHA185148a46c2dedc88125db07eb5a1ddd89fe88a01
SHA256284c601c1f7ed02052f8b8dd8a2f71e446e88577878fcfb9536c702fdc9c68b0
SHA512ce9678b62e6fc64be4202722030dcde87e0ebf7d95eafb49c2991ecf9d5e92231bb94ecfd27df05cd059dc545aa75c2368862196d30e5aab2d2f051cff34acbe
-
Filesize
134KB
MD526b123b35375434cc474e9100c138a89
SHA1189a1aca36bba7fbc4e48bcf7d3e35b191c8a145
SHA256edea49cf3448b574be8d41bf09ef83568ff121705964ab3ed68e943b1b4d3c29
SHA512e6fef0ed5d39e11c26cd0f95300b2da6795bcaca32335b6ca2107096c741877b90fbd43aac652f67530bff1d78099600e6caf1695e2baedd4315ea7f4ebbac05
-
Filesize
134KB
MD537a57749ee8863d72a51169e465849ca
SHA1c620e1e0cf80a5de2b6a1905b922e9935cb37ae1
SHA2564579f65d38962ad93c57a96a266d4ab717c3a05e095ba375841e3c38b43da010
SHA512e55fe71e6c88ae85e7797a596bafb2aed66235d4b173829d848d2d0d1db8c394012703353f6ffc96d27c40700e2d83875f96508fdc6361bc79d24634e51e7935