Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 04:38
Static task
static1
Behavioral task
behavioral1
Sample
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
Resource
win7-20241010-en
General
-
Target
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
-
Size
134KB
-
MD5
dc35c9d2c141e65a01fed54e5f4b06fb
-
SHA1
87b929eb932881f275296c2c8c4bf456613a85bf
-
SHA256
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21
-
SHA512
878ce2e60ea0516fa51109eaf17b561499eb77c8e927c7ea5912a85f6e552aa3c0d75addaf27af5b20c89b7d812b4588076199a409b14c977c96724d71e9c997
-
SSDEEP
1536:XDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:ziRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3780 omsecor.exe 212 omsecor.exe 4412 omsecor.exe 1252 omsecor.exe 2576 omsecor.exe 4992 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1680 set thread context of 2376 1680 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 83 PID 3780 set thread context of 212 3780 omsecor.exe 87 PID 4412 set thread context of 1252 4412 omsecor.exe 109 PID 2576 set thread context of 4992 2576 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3556 1680 WerFault.exe 82 3492 3780 WerFault.exe 85 2444 4412 WerFault.exe 108 3904 2576 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2376 1680 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 83 PID 1680 wrote to memory of 2376 1680 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 83 PID 1680 wrote to memory of 2376 1680 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 83 PID 1680 wrote to memory of 2376 1680 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 83 PID 1680 wrote to memory of 2376 1680 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 83 PID 2376 wrote to memory of 3780 2376 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 85 PID 2376 wrote to memory of 3780 2376 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 85 PID 2376 wrote to memory of 3780 2376 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 85 PID 3780 wrote to memory of 212 3780 omsecor.exe 87 PID 3780 wrote to memory of 212 3780 omsecor.exe 87 PID 3780 wrote to memory of 212 3780 omsecor.exe 87 PID 3780 wrote to memory of 212 3780 omsecor.exe 87 PID 3780 wrote to memory of 212 3780 omsecor.exe 87 PID 212 wrote to memory of 4412 212 omsecor.exe 108 PID 212 wrote to memory of 4412 212 omsecor.exe 108 PID 212 wrote to memory of 4412 212 omsecor.exe 108 PID 4412 wrote to memory of 1252 4412 omsecor.exe 109 PID 4412 wrote to memory of 1252 4412 omsecor.exe 109 PID 4412 wrote to memory of 1252 4412 omsecor.exe 109 PID 4412 wrote to memory of 1252 4412 omsecor.exe 109 PID 4412 wrote to memory of 1252 4412 omsecor.exe 109 PID 1252 wrote to memory of 2576 1252 omsecor.exe 111 PID 1252 wrote to memory of 2576 1252 omsecor.exe 111 PID 1252 wrote to memory of 2576 1252 omsecor.exe 111 PID 2576 wrote to memory of 4992 2576 omsecor.exe 113 PID 2576 wrote to memory of 4992 2576 omsecor.exe 113 PID 2576 wrote to memory of 4992 2576 omsecor.exe 113 PID 2576 wrote to memory of 4992 2576 omsecor.exe 113 PID 2576 wrote to memory of 4992 2576 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exeC:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 2568⤵
- Program crash
PID:3904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 2966⤵
- Program crash
PID:2444
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 3004⤵
- Program crash
PID:3492
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 2722⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1680 -ip 16801⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3780 -ip 37801⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4412 -ip 44121⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2576 -ip 25761⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD53db02d432c7e1af2d1d9b3d217109ce9
SHA1d563545fab1d511f82bbe69c6eeddc20144a4df5
SHA256b3cdb98f54ddd9754b6553b7b6914a2f2543073982a41c5e15ec14a4f68ea0f8
SHA512c3796c44c72194e7a011b7536b47ae899f373af18eceef632662073bd5c8156a0014cdd673984103bb478385e36d9018656de6eb5f550c167da8ed2415266455
-
Filesize
134KB
MD52019304045626d7fb3b549ee493db083
SHA1b193f0ff08ab3c0b453b856ae9e1437f9536b247
SHA25615e7173a479d16baf8f393306d01ed69253712e264be71032ddbf8e1f3a7adc4
SHA5123fd5ba8ad2e71498125a58945d0027afec0752926d83adb6a0c3908f21f0902099c0da4cde3efd693afc19456466f5d8b1d41d02a23e0b60a675a473aebd8b60
-
Filesize
134KB
MD5ac963a5489dc6d6c5f8dba2f504d87a5
SHA1e7a13b49b6439b7353d4a5524ff1cb572eb5cf85
SHA256217e47e3ea0c2ab50e12522bf9978b0999e991faf996724cae4fd4ad45df2ebd
SHA512521ac1c956ab3cf6c7d89f3a82e3d984a4008b4470fe712a6c0c4eee08b569271f6bed221435a46c94825bce8295fd0ca68850f4cd3941b14ace468b1ddcba8a