Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 04:32
Static task
static1
Behavioral task
behavioral1
Sample
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
Resource
win7-20240903-en
General
-
Target
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
-
Size
134KB
-
MD5
dc35c9d2c141e65a01fed54e5f4b06fb
-
SHA1
87b929eb932881f275296c2c8c4bf456613a85bf
-
SHA256
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21
-
SHA512
878ce2e60ea0516fa51109eaf17b561499eb77c8e927c7ea5912a85f6e552aa3c0d75addaf27af5b20c89b7d812b4588076199a409b14c977c96724d71e9c997
-
SSDEEP
1536:XDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:ziRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1180 omsecor.exe 1796 omsecor.exe 3216 omsecor.exe 2360 omsecor.exe 3640 omsecor.exe 2452 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1068 set thread context of 3616 1068 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 84 PID 1180 set thread context of 1796 1180 omsecor.exe 88 PID 3216 set thread context of 2360 3216 omsecor.exe 102 PID 3640 set thread context of 2452 3640 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 856 1068 WerFault.exe 83 1880 1180 WerFault.exe 86 2112 3216 WerFault.exe 101 4900 3640 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1068 wrote to memory of 3616 1068 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 84 PID 1068 wrote to memory of 3616 1068 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 84 PID 1068 wrote to memory of 3616 1068 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 84 PID 1068 wrote to memory of 3616 1068 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 84 PID 1068 wrote to memory of 3616 1068 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 84 PID 3616 wrote to memory of 1180 3616 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 86 PID 3616 wrote to memory of 1180 3616 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 86 PID 3616 wrote to memory of 1180 3616 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 86 PID 1180 wrote to memory of 1796 1180 omsecor.exe 88 PID 1180 wrote to memory of 1796 1180 omsecor.exe 88 PID 1180 wrote to memory of 1796 1180 omsecor.exe 88 PID 1180 wrote to memory of 1796 1180 omsecor.exe 88 PID 1180 wrote to memory of 1796 1180 omsecor.exe 88 PID 1796 wrote to memory of 3216 1796 omsecor.exe 101 PID 1796 wrote to memory of 3216 1796 omsecor.exe 101 PID 1796 wrote to memory of 3216 1796 omsecor.exe 101 PID 3216 wrote to memory of 2360 3216 omsecor.exe 102 PID 3216 wrote to memory of 2360 3216 omsecor.exe 102 PID 3216 wrote to memory of 2360 3216 omsecor.exe 102 PID 3216 wrote to memory of 2360 3216 omsecor.exe 102 PID 3216 wrote to memory of 2360 3216 omsecor.exe 102 PID 2360 wrote to memory of 3640 2360 omsecor.exe 104 PID 2360 wrote to memory of 3640 2360 omsecor.exe 104 PID 2360 wrote to memory of 3640 2360 omsecor.exe 104 PID 3640 wrote to memory of 2452 3640 omsecor.exe 106 PID 3640 wrote to memory of 2452 3640 omsecor.exe 106 PID 3640 wrote to memory of 2452 3640 omsecor.exe 106 PID 3640 wrote to memory of 2452 3640 omsecor.exe 106 PID 3640 wrote to memory of 2452 3640 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exeC:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 2688⤵
- Program crash
PID:4900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 2926⤵
- Program crash
PID:2112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 2884⤵
- Program crash
PID:1880
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 2842⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1068 -ip 10681⤵PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1180 -ip 11801⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3216 -ip 32161⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3640 -ip 36401⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5252d750edc02fceae80bbed537f2957e
SHA17a7e9062364230d6d7e81579a05461df82e6fe4b
SHA2567eb05e5b79c18b750898adc1bf72d381d472252c6b4f47571f5345d7b21e65c8
SHA5128a52cb1665e2c93a43d1f128c96e72fbb1ab41bebad908c42ad73c7b9e13eeed4d3c2072af1d875bf2aed2868542bba09c5f99f20be5e31d0e10bebcd1134db5
-
Filesize
134KB
MD52019304045626d7fb3b549ee493db083
SHA1b193f0ff08ab3c0b453b856ae9e1437f9536b247
SHA25615e7173a479d16baf8f393306d01ed69253712e264be71032ddbf8e1f3a7adc4
SHA5123fd5ba8ad2e71498125a58945d0027afec0752926d83adb6a0c3908f21f0902099c0da4cde3efd693afc19456466f5d8b1d41d02a23e0b60a675a473aebd8b60
-
Filesize
134KB
MD5b4b8eb9f99bf473c27f6c173e34e16f9
SHA124cc21c6a932c734a1d4e6d092e936351dd67654
SHA2565233689d09f0d7ee59afe57a7149448f40f039a8af25fa860a6d4f07a6945c0e
SHA512496ce52e6a408c37bd8f92be26a9e52a451e3cdb2724872bfd792c472114f6dcec0a10e52258df7ac40b9e2f4e71b4cfc7580866e6d787ff688961aa45dfd883