Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 19:41
Static task
static1
Behavioral task
behavioral1
Sample
096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe
Resource
win7-20241010-en
General
-
Target
096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe
-
Size
96KB
-
MD5
c261a75f6c9f7a22d29f7d47424c9f1b
-
SHA1
0023b2369c66b591b01478264bb22e64cd5bb2be
-
SHA256
096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f
-
SHA512
9bd15e1b296a26bbbe60472958f0b3b7a8b70dbed81165b99b623d468213888d5bebcd838ed5ccac35feb3e9ecbe8d80a009d98b1fad7c370c02f32f7badfb12
-
SSDEEP
1536:PnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:PGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4964 omsecor.exe 4644 omsecor.exe 4552 omsecor.exe 5080 omsecor.exe 2700 omsecor.exe 3088 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 216 set thread context of 4284 216 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 84 PID 4964 set thread context of 4644 4964 omsecor.exe 89 PID 4552 set thread context of 5080 4552 omsecor.exe 102 PID 2700 set thread context of 3088 2700 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 4584 216 WerFault.exe 83 2228 4964 WerFault.exe 87 4560 4552 WerFault.exe 101 3188 2700 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 216 wrote to memory of 4284 216 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 84 PID 216 wrote to memory of 4284 216 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 84 PID 216 wrote to memory of 4284 216 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 84 PID 216 wrote to memory of 4284 216 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 84 PID 216 wrote to memory of 4284 216 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 84 PID 4284 wrote to memory of 4964 4284 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 87 PID 4284 wrote to memory of 4964 4284 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 87 PID 4284 wrote to memory of 4964 4284 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 87 PID 4964 wrote to memory of 4644 4964 omsecor.exe 89 PID 4964 wrote to memory of 4644 4964 omsecor.exe 89 PID 4964 wrote to memory of 4644 4964 omsecor.exe 89 PID 4964 wrote to memory of 4644 4964 omsecor.exe 89 PID 4964 wrote to memory of 4644 4964 omsecor.exe 89 PID 4644 wrote to memory of 4552 4644 omsecor.exe 101 PID 4644 wrote to memory of 4552 4644 omsecor.exe 101 PID 4644 wrote to memory of 4552 4644 omsecor.exe 101 PID 4552 wrote to memory of 5080 4552 omsecor.exe 102 PID 4552 wrote to memory of 5080 4552 omsecor.exe 102 PID 4552 wrote to memory of 5080 4552 omsecor.exe 102 PID 4552 wrote to memory of 5080 4552 omsecor.exe 102 PID 4552 wrote to memory of 5080 4552 omsecor.exe 102 PID 5080 wrote to memory of 2700 5080 omsecor.exe 104 PID 5080 wrote to memory of 2700 5080 omsecor.exe 104 PID 5080 wrote to memory of 2700 5080 omsecor.exe 104 PID 2700 wrote to memory of 3088 2700 omsecor.exe 106 PID 2700 wrote to memory of 3088 2700 omsecor.exe 106 PID 2700 wrote to memory of 3088 2700 omsecor.exe 106 PID 2700 wrote to memory of 3088 2700 omsecor.exe 106 PID 2700 wrote to memory of 3088 2700 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe"C:\Users\Admin\AppData\Local\Temp\096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exeC:\Users\Admin\AppData\Local\Temp\096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 2568⤵
- Program crash
PID:3188
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 2926⤵
- Program crash
PID:4560
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 2884⤵
- Program crash
PID:2228
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 2882⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 216 -ip 2161⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4964 -ip 49641⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4552 -ip 45521⤵PID:2800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2700 -ip 27001⤵PID:3780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5dab90aa322e45c57d85593a361fbbfee
SHA12215c750b7041dd1829ba7559f447ffb5ca7fecd
SHA25629e72d8f952412cda9f2fb196d5d9264c9590e7c07290b54f75bdf614e2a7808
SHA51284e27f1c182eff078186ffab0234219e4fbbcde3b96a9b6ec9b0e065c309ff123660df6af4daf3da5a059746611f1059e40482ad73eea3914ad884422f5ac507
-
Filesize
96KB
MD54b8383283d34b1f4bbeb004b6d4ad652
SHA12b1271aa4aa09c93b945e007d67af426eb7d1953
SHA2561f97bd30f10479e8a1e4bd73a4f15f408bfd3805d6684d58d2cb767099032abd
SHA5125c45c13fb8ea1ad4345cfc63f6d8d924302ca4e1dee0ff54cf686c41587f6fd4d698aa5d683f3f6fc338714a72a9ca5e52180c5382860ca6b4063fac9edf1886
-
Filesize
96KB
MD5cf07b64a4ae768005a8021416d66de98
SHA1d9ca1bd82b0f4402c248d5c0e0ce2c1adf0dd1f2
SHA2568452b956ce9e041984675932487b6c1c7c08a08204e11fc52f003b5a461972bd
SHA512fadc7acf1e1b1849a3a7d9b982b85ff01caa4da8821de0256db84bbef4646e5c06ba4aa776538840652f13c24cc19b40663c69d0ab3f276b10d425e3f8fcac00