Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 09:05
Static task
static1
Behavioral task
behavioral1
Sample
dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe
Resource
win7-20240708-en
General
-
Target
dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe
-
Size
96KB
-
MD5
6265f95b5751682f1cf51e2acbf42108
-
SHA1
1a92795b59ed886e299a84b5f1c6d179a7f9fda5
-
SHA256
dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7
-
SHA512
4614dc6c42a212b50e3fe839f9fbd2197fe34cb92e1c053506cb7f13087f8c16c35c2a4b1171d9cba76d8d815ed4605076452ae5af01b1c378a62e39e4c15c4b
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:xGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2732 omsecor.exe 4196 omsecor.exe 4976 omsecor.exe 1284 omsecor.exe 2360 omsecor.exe 2004 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3124 set thread context of 3460 3124 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 82 PID 2732 set thread context of 4196 2732 omsecor.exe 87 PID 4976 set thread context of 1284 4976 omsecor.exe 100 PID 2360 set thread context of 2004 2360 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 4188 3124 WerFault.exe 81 2116 2732 WerFault.exe 84 4528 4976 WerFault.exe 99 4900 2360 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3124 wrote to memory of 3460 3124 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 82 PID 3124 wrote to memory of 3460 3124 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 82 PID 3124 wrote to memory of 3460 3124 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 82 PID 3124 wrote to memory of 3460 3124 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 82 PID 3124 wrote to memory of 3460 3124 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 82 PID 3460 wrote to memory of 2732 3460 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 84 PID 3460 wrote to memory of 2732 3460 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 84 PID 3460 wrote to memory of 2732 3460 dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe 84 PID 2732 wrote to memory of 4196 2732 omsecor.exe 87 PID 2732 wrote to memory of 4196 2732 omsecor.exe 87 PID 2732 wrote to memory of 4196 2732 omsecor.exe 87 PID 2732 wrote to memory of 4196 2732 omsecor.exe 87 PID 2732 wrote to memory of 4196 2732 omsecor.exe 87 PID 4196 wrote to memory of 4976 4196 omsecor.exe 99 PID 4196 wrote to memory of 4976 4196 omsecor.exe 99 PID 4196 wrote to memory of 4976 4196 omsecor.exe 99 PID 4976 wrote to memory of 1284 4976 omsecor.exe 100 PID 4976 wrote to memory of 1284 4976 omsecor.exe 100 PID 4976 wrote to memory of 1284 4976 omsecor.exe 100 PID 4976 wrote to memory of 1284 4976 omsecor.exe 100 PID 4976 wrote to memory of 1284 4976 omsecor.exe 100 PID 1284 wrote to memory of 2360 1284 omsecor.exe 102 PID 1284 wrote to memory of 2360 1284 omsecor.exe 102 PID 1284 wrote to memory of 2360 1284 omsecor.exe 102 PID 2360 wrote to memory of 2004 2360 omsecor.exe 103 PID 2360 wrote to memory of 2004 2360 omsecor.exe 103 PID 2360 wrote to memory of 2004 2360 omsecor.exe 103 PID 2360 wrote to memory of 2004 2360 omsecor.exe 103 PID 2360 wrote to memory of 2004 2360 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe"C:\Users\Admin\AppData\Local\Temp\dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exeC:\Users\Admin\AppData\Local\Temp\dc8638a995ef9800aae48a3a82ad44044a944229352cc366c1db73d9380f0ac7.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 2568⤵
- Program crash
PID:4900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 2966⤵
- Program crash
PID:4528
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 3004⤵
- Program crash
PID:2116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 3042⤵
- Program crash
PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3124 -ip 31241⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2732 -ip 27321⤵PID:3964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4976 -ip 49761⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2360 -ip 23601⤵PID:4316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c7c47a004eb060f5a0cc1fda7b78e9d9
SHA18ff3b25b85402f6c5b7009655419da2615c8ba5c
SHA2566b602921fe6ba928bb6fa63287bf293280a23f637eef3b7da9d1a7d36c59c3cf
SHA512c4232b41e51e1f450ea95fe1f71f902c354f822c68cd695d11505ae5e7be1985084d082b821ec272d86c845e7186b6a984430e47dbde02c12ad066de84707a5f
-
Filesize
96KB
MD59a51872b871cc037205373097524b178
SHA1d5b019d3328898dec3dc865b3c7bec53be7d0ece
SHA256fdfcdb8c11224c2beead9431ae6996f940e18f32df9395fa33f16fdebbc4b0c6
SHA51200519ce734844508e693f6c82d00e7ace84914f296b7ad7ea00ac37c3a0bddfbc4c3543adb0bc0aae1abb898f09da7bd530b2d55bf07c28d34e027a2849ee08a
-
Filesize
96KB
MD5813c74a85525d4344ae6ab7a227d113c
SHA1d39319808ae8d459ce2067eec2b452f4b950c1ff
SHA256951c466b9b8e0f26b4a8ce73179451141df65adb8cf59a6eb157f25039dd71f7
SHA51255eca592e0cf24a81de08091a9e34cb428fc91e26a8958d8716a25ffcea6b0800a1abadc084d98de3b5ef6ec33d29850f5f64e9a55394d11362543995c33d989