Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 01:54
Static task
static1
Behavioral task
behavioral1
Sample
180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe
Resource
win7-20240729-en
General
-
Target
180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe
-
Size
96KB
-
MD5
7aa641b1d69c7cc218cf6aec1254e860
-
SHA1
a67079b0fb7d7185dc0cdad3537d8aea27d58e2b
-
SHA256
180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244
-
SHA512
fb3711ccc5da435de67879277213b975c7dd1a693075fb4617487dac7acd85c91323b9cdef1535112f42af9f23381b15dcfb9b0f1e4e5eb56cefafe4d897638d
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:vGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3672 omsecor.exe 456 omsecor.exe 3684 omsecor.exe 3928 omsecor.exe 1568 omsecor.exe 1748 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1372 set thread context of 1460 1372 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 83 PID 3672 set thread context of 456 3672 omsecor.exe 87 PID 3684 set thread context of 3928 3684 omsecor.exe 108 PID 1568 set thread context of 1748 1568 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4228 1372 WerFault.exe 82 372 3672 WerFault.exe 85 4420 3684 WerFault.exe 107 2208 1568 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1460 1372 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 83 PID 1372 wrote to memory of 1460 1372 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 83 PID 1372 wrote to memory of 1460 1372 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 83 PID 1372 wrote to memory of 1460 1372 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 83 PID 1372 wrote to memory of 1460 1372 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 83 PID 1460 wrote to memory of 3672 1460 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 85 PID 1460 wrote to memory of 3672 1460 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 85 PID 1460 wrote to memory of 3672 1460 180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe 85 PID 3672 wrote to memory of 456 3672 omsecor.exe 87 PID 3672 wrote to memory of 456 3672 omsecor.exe 87 PID 3672 wrote to memory of 456 3672 omsecor.exe 87 PID 3672 wrote to memory of 456 3672 omsecor.exe 87 PID 3672 wrote to memory of 456 3672 omsecor.exe 87 PID 456 wrote to memory of 3684 456 omsecor.exe 107 PID 456 wrote to memory of 3684 456 omsecor.exe 107 PID 456 wrote to memory of 3684 456 omsecor.exe 107 PID 3684 wrote to memory of 3928 3684 omsecor.exe 108 PID 3684 wrote to memory of 3928 3684 omsecor.exe 108 PID 3684 wrote to memory of 3928 3684 omsecor.exe 108 PID 3684 wrote to memory of 3928 3684 omsecor.exe 108 PID 3684 wrote to memory of 3928 3684 omsecor.exe 108 PID 3928 wrote to memory of 1568 3928 omsecor.exe 110 PID 3928 wrote to memory of 1568 3928 omsecor.exe 110 PID 3928 wrote to memory of 1568 3928 omsecor.exe 110 PID 1568 wrote to memory of 1748 1568 omsecor.exe 112 PID 1568 wrote to memory of 1748 1568 omsecor.exe 112 PID 1568 wrote to memory of 1748 1568 omsecor.exe 112 PID 1568 wrote to memory of 1748 1568 omsecor.exe 112 PID 1568 wrote to memory of 1748 1568 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe"C:\Users\Admin\AppData\Local\Temp\180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exeC:\Users\Admin\AppData\Local\Temp\180576a3dcebf919f587c9e59b526a6a21f5c32ee7fb4bd428ee37d4c1e7e244N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 2568⤵
- Program crash
PID:2208
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 2926⤵
- Program crash
PID:4420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 2884⤵
- Program crash
PID:372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 2882⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1372 -ip 13721⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3672 -ip 36721⤵PID:3036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3684 -ip 36841⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 348 -p 1568 -ip 15681⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55ec47149b8d3170bc65a6fb0093876df
SHA1676a109ccfe3dedbffefd0cb2798bbdb9d8bdcc4
SHA256678fa45411b802377ba79bb2954164f8d55e869769e7aa14677fb22ef9f8345d
SHA512c63b44f50decc7d43e5a0ec3533cfae9b050ae623b618fbf63381e59aa2e4731d89ce3cd52d4b00c2f2c038d9e301b941556aac9c4bbe6f03bfe54cf3d813184
-
Filesize
96KB
MD5b9d2740ab3d937b41fcaac9447499873
SHA17ceff6b95857ae80bea10701262bc0979839c469
SHA256e80c8d1519a7018d3d4d72c66df9c7119fc7502efee8f08d09a39a6cc43ad4b0
SHA5123b0b7fa09d984d686feadccd703b8df9a62096d6221e09a6081f04c7c983e7db88ba97c57f21a2db4e12e653322481feaa13cae69ec9a74e7add3c8bad8939a4
-
Filesize
96KB
MD5f4b592eeb84ab5a5fbbe18d4e942a57c
SHA113db44b542c214c893142125c03f2415ae123a23
SHA256de71364b6242642ff6221f84820c26d59b8c2ffbff4013e85bf93276cda0e4bd
SHA512ccddf302f2a2831765d0afcf4c2d8864207ebe954b1bf79958f2448836fd6ff064d3feea48488892e7dd8e7d5e6665a333e41bb4f0a086e65fc9912af17a8a8d