Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 22:07
Static task
static1
Behavioral task
behavioral1
Sample
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe
Resource
win7-20240903-en
General
-
Target
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe
-
Size
96KB
-
MD5
935034ed710c7393ffc572c5f46674cd
-
SHA1
0d5e36171d8491af625a580969badcb4805c62fb
-
SHA256
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842
-
SHA512
cbaba63a8b020aa64318c7c78b07d5d6c242b97a6c229c26676b64c6f8298208d7c61ea577b8a3fec5f1505b965b886d09cf149ec6c13ddeccab0a375cdf50f1
-
SSDEEP
1536:lnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:lGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4456 omsecor.exe 3648 omsecor.exe 3324 omsecor.exe 4128 omsecor.exe 2932 omsecor.exe 3872 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4380 set thread context of 3084 4380 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 82 PID 4456 set thread context of 3648 4456 omsecor.exe 87 PID 3324 set thread context of 4128 3324 omsecor.exe 100 PID 2932 set thread context of 3872 2932 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3784 4380 WerFault.exe 81 1472 4456 WerFault.exe 84 1576 3324 WerFault.exe 99 4384 2932 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4380 wrote to memory of 3084 4380 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 82 PID 4380 wrote to memory of 3084 4380 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 82 PID 4380 wrote to memory of 3084 4380 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 82 PID 4380 wrote to memory of 3084 4380 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 82 PID 4380 wrote to memory of 3084 4380 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 82 PID 3084 wrote to memory of 4456 3084 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 84 PID 3084 wrote to memory of 4456 3084 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 84 PID 3084 wrote to memory of 4456 3084 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 84 PID 4456 wrote to memory of 3648 4456 omsecor.exe 87 PID 4456 wrote to memory of 3648 4456 omsecor.exe 87 PID 4456 wrote to memory of 3648 4456 omsecor.exe 87 PID 4456 wrote to memory of 3648 4456 omsecor.exe 87 PID 4456 wrote to memory of 3648 4456 omsecor.exe 87 PID 3648 wrote to memory of 3324 3648 omsecor.exe 99 PID 3648 wrote to memory of 3324 3648 omsecor.exe 99 PID 3648 wrote to memory of 3324 3648 omsecor.exe 99 PID 3324 wrote to memory of 4128 3324 omsecor.exe 100 PID 3324 wrote to memory of 4128 3324 omsecor.exe 100 PID 3324 wrote to memory of 4128 3324 omsecor.exe 100 PID 3324 wrote to memory of 4128 3324 omsecor.exe 100 PID 3324 wrote to memory of 4128 3324 omsecor.exe 100 PID 4128 wrote to memory of 2932 4128 omsecor.exe 102 PID 4128 wrote to memory of 2932 4128 omsecor.exe 102 PID 4128 wrote to memory of 2932 4128 omsecor.exe 102 PID 2932 wrote to memory of 3872 2932 omsecor.exe 104 PID 2932 wrote to memory of 3872 2932 omsecor.exe 104 PID 2932 wrote to memory of 3872 2932 omsecor.exe 104 PID 2932 wrote to memory of 3872 2932 omsecor.exe 104 PID 2932 wrote to memory of 3872 2932 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe"C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exeC:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 2568⤵
- Program crash
PID:4384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 2926⤵
- Program crash
PID:1576
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 2764⤵
- Program crash
PID:1472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 2882⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4380 -ip 43801⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4456 -ip 44561⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3324 -ip 33241⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2932 -ip 29321⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5071613e7b7edc4081e267ecc46adad39
SHA1dcd241c9eb2cace260e0124ad8527c771d63341b
SHA2560e4ee90643fd7e06dfb02bf74a683e2da14a0ee448117f8e9be82d22be5e89af
SHA512a54a893436a0aa6faa9cee174f68a9676dd185813997f7623d0f8e5f489ebe578c6a6900b7b119c4dadcf9d3c5b1a452311c39404a0d5f61df062e233fbc65e2
-
Filesize
96KB
MD5e1f1ff1da39a6baaf4dbf3deaa1af0cd
SHA1486b5dcbb9d9693c649cd1f10a0a57cd475f9729
SHA25697337c0f5cfef23c7093870b4cf3ea51131fc82100798e7f8312d0c1fbb4ad89
SHA5128d29cd772da12d046e9bd5dc69623b1fe2e4533c0efd20617a69724ccd49947942c5a106b40d4a2355acdd1d6cd6cfad7dd18fac3ad3d763795e56c90c508069
-
Filesize
96KB
MD5c3afb9b8c2250df87e7e506df053cb0d
SHA1beceb77aac59cfad2798a2e276feb57f98038094
SHA2567a32d04d58779eff7b263e9d80747e5e27f230f1d38d9d4e629c351679c0a0b3
SHA512ee707ea06001a2bab2cc5531ddeae1d248704e78c7a3ccf46eebbc239f1fab40c328159bdb84a1b69160d64fa746188a06941bc40cb57512f7b3a87480f3dfdf