Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 22:57
Static task
static1
Behavioral task
behavioral1
Sample
59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe
Resource
win7-20240903-en
General
-
Target
59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe
-
Size
134KB
-
MD5
19d6483fdba0d0cde976a108c16686c0
-
SHA1
8e41b2280d7e0f3da59aa307eef8e6369891fe22
-
SHA256
59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9
-
SHA512
cfae729899cc26e4063c67ba9c40de794d8f2b66e5fc2adc61f69ffeb753af519eed204c7934009ec3718ded1554c37a438182dda0415b4a1015ba39af788b88
-
SSDEEP
1536:nDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:DiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4736 omsecor.exe 2836 omsecor.exe 2396 omsecor.exe 4528 omsecor.exe 512 omsecor.exe 1976 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4928 set thread context of 1232 4928 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 84 PID 4736 set thread context of 2836 4736 omsecor.exe 89 PID 2396 set thread context of 4528 2396 omsecor.exe 109 PID 512 set thread context of 1976 512 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3912 4928 WerFault.exe 83 3820 4736 WerFault.exe 87 1512 2396 WerFault.exe 108 640 512 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4928 wrote to memory of 1232 4928 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 84 PID 4928 wrote to memory of 1232 4928 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 84 PID 4928 wrote to memory of 1232 4928 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 84 PID 4928 wrote to memory of 1232 4928 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 84 PID 4928 wrote to memory of 1232 4928 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 84 PID 1232 wrote to memory of 4736 1232 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 87 PID 1232 wrote to memory of 4736 1232 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 87 PID 1232 wrote to memory of 4736 1232 59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe 87 PID 4736 wrote to memory of 2836 4736 omsecor.exe 89 PID 4736 wrote to memory of 2836 4736 omsecor.exe 89 PID 4736 wrote to memory of 2836 4736 omsecor.exe 89 PID 4736 wrote to memory of 2836 4736 omsecor.exe 89 PID 4736 wrote to memory of 2836 4736 omsecor.exe 89 PID 2836 wrote to memory of 2396 2836 omsecor.exe 108 PID 2836 wrote to memory of 2396 2836 omsecor.exe 108 PID 2836 wrote to memory of 2396 2836 omsecor.exe 108 PID 2396 wrote to memory of 4528 2396 omsecor.exe 109 PID 2396 wrote to memory of 4528 2396 omsecor.exe 109 PID 2396 wrote to memory of 4528 2396 omsecor.exe 109 PID 2396 wrote to memory of 4528 2396 omsecor.exe 109 PID 2396 wrote to memory of 4528 2396 omsecor.exe 109 PID 4528 wrote to memory of 512 4528 omsecor.exe 111 PID 4528 wrote to memory of 512 4528 omsecor.exe 111 PID 4528 wrote to memory of 512 4528 omsecor.exe 111 PID 512 wrote to memory of 1976 512 omsecor.exe 113 PID 512 wrote to memory of 1976 512 omsecor.exe 113 PID 512 wrote to memory of 1976 512 omsecor.exe 113 PID 512 wrote to memory of 1976 512 omsecor.exe 113 PID 512 wrote to memory of 1976 512 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe"C:\Users\Admin\AppData\Local\Temp\59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exeC:\Users\Admin\AppData\Local\Temp\59296bb2961ad640fbcee07970ce07acace09ded78203debbe6a0d323619abc9N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 2568⤵
- Program crash
PID:640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 2926⤵
- Program crash
PID:1512
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 2884⤵
- Program crash
PID:3820
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 2882⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4928 -ip 49281⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4736 -ip 47361⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2396 -ip 23961⤵PID:2928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 512 -ip 5121⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD594b22464bea9acfde5a11f0c066711e1
SHA16d58e9f0db8359e4aac1446b5d33e6b8fd65674e
SHA2561a6c2203c9f551d5ea161aae0190e0bc6613d0edbb973995eb24430d02b97c78
SHA512d258a1c3e10c8a21163f22a158fbeca6877beb7253653a68429da859db36c0ed32c14cf39921788f1e0e499bd2e286427dfa61affaa415ef5c64764b6ac2fe70
-
Filesize
134KB
MD58d7ae5d120a4332c684ddd3a5b81b29b
SHA111e313aafbdf5aae1ed7c99bd0289ba5dab37bac
SHA25638c38ba02edfe751951897cfbee225eda9b3b92dfd2fc9763d90a6dc910b118f
SHA51287388bd296042bf2e2607f39cfd357692b9d7957f5dd7b50fdb07d31aad3a16f46145a0b7f9785ea757b6836084f3c40ad73220d7c061d09b6d1608748a72c58
-
Filesize
134KB
MD56e06e4eb1041a5bffa580d7a450c5834
SHA1d0d0fb2a546b350df1f461109247e2f9ddc4757f
SHA256777c89e88e086c271e3ece2163917f849db2f7dd1a2ec6c68d14cafffa846eb5
SHA512af673bed503edc46986a81dd6a1ad68be076b94509a9de17b58f69c4cd1b014e7f11638a5048bb334d45e0625f52fa4336ec45ba6aa5554996df9d11940c1b36