Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 10:25
Static task
static1
Behavioral task
behavioral1
Sample
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe
Resource
win7-20240708-en
General
-
Target
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe
-
Size
96KB
-
MD5
3076cf51738ce95e89569894b2fc7b40
-
SHA1
7d60990e226390257d7627dc0bb21ae491a21391
-
SHA256
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e
-
SHA512
cc311f8be8e08e1b1fbda869352201283671fedadd89b9fd7b9d3af7591d11d0273a1941793e372b948431f4a8170a687148714f2aee3e17824bfbeffc949d10
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:EGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4464 omsecor.exe 5036 omsecor.exe 4844 omsecor.exe 3468 omsecor.exe 4892 omsecor.exe 2436 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3032 set thread context of 2084 3032 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 83 PID 4464 set thread context of 5036 4464 omsecor.exe 87 PID 4844 set thread context of 3468 4844 omsecor.exe 107 PID 4892 set thread context of 2436 4892 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 4336 4464 WerFault.exe 85 3312 3032 WerFault.exe 82 4616 4844 WerFault.exe 106 3592 4892 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2084 3032 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 83 PID 3032 wrote to memory of 2084 3032 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 83 PID 3032 wrote to memory of 2084 3032 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 83 PID 3032 wrote to memory of 2084 3032 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 83 PID 3032 wrote to memory of 2084 3032 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 83 PID 2084 wrote to memory of 4464 2084 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 85 PID 2084 wrote to memory of 4464 2084 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 85 PID 2084 wrote to memory of 4464 2084 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe 85 PID 4464 wrote to memory of 5036 4464 omsecor.exe 87 PID 4464 wrote to memory of 5036 4464 omsecor.exe 87 PID 4464 wrote to memory of 5036 4464 omsecor.exe 87 PID 4464 wrote to memory of 5036 4464 omsecor.exe 87 PID 4464 wrote to memory of 5036 4464 omsecor.exe 87 PID 5036 wrote to memory of 4844 5036 omsecor.exe 106 PID 5036 wrote to memory of 4844 5036 omsecor.exe 106 PID 5036 wrote to memory of 4844 5036 omsecor.exe 106 PID 4844 wrote to memory of 3468 4844 omsecor.exe 107 PID 4844 wrote to memory of 3468 4844 omsecor.exe 107 PID 4844 wrote to memory of 3468 4844 omsecor.exe 107 PID 4844 wrote to memory of 3468 4844 omsecor.exe 107 PID 4844 wrote to memory of 3468 4844 omsecor.exe 107 PID 3468 wrote to memory of 4892 3468 omsecor.exe 109 PID 3468 wrote to memory of 4892 3468 omsecor.exe 109 PID 3468 wrote to memory of 4892 3468 omsecor.exe 109 PID 4892 wrote to memory of 2436 4892 omsecor.exe 111 PID 4892 wrote to memory of 2436 4892 omsecor.exe 111 PID 4892 wrote to memory of 2436 4892 omsecor.exe 111 PID 4892 wrote to memory of 2436 4892 omsecor.exe 111 PID 4892 wrote to memory of 2436 4892 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe"C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exeC:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 2568⤵
- Program crash
PID:3592
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 2926⤵
- Program crash
PID:4616
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 2924⤵
- Program crash
PID:4336
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 2882⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3032 -ip 30321⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4464 -ip 44641⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4844 -ip 48441⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4892 -ip 48921⤵PID:3556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD537cdf847e6425f2f632ed06d85d91e6b
SHA1b59384d47fcb4cbea02ae2397cd877f55fa62cf4
SHA2561b441f6a53c198fbae58887f4ddcdc14324e0abefe99afad8c653562b2b03e7b
SHA5125e9e2aa655b78eec17627accdf161f50fd633d17b58d5ae3b611d5c81328e7fff0b7892232d26976d73927fba288c09b9fc1f020845daad5f6a5b25a88204be7
-
Filesize
96KB
MD55380557f87dbdce5df6b891ee51953ca
SHA13bf0eb859e6cf123bb090297e8b99fb23580810a
SHA256cab388cb4ff5ea21173816d2f7f694f83137c0b08ffd51dc20bc3b249173bac6
SHA512729c20863b1f4dbdadff127e4706d4785e6ac721f50afeafb91ec14ff15a94430b11e225848c06df8af06253c808178ff56b70ac268cbe28c0b90bbfdce229ea
-
Filesize
96KB
MD520c7d3f62faba13a9d661f41d2634c28
SHA11c0351c6f7377765eec4e94cf30ad51a8f406bc0
SHA2569f99822c01e720336c0871b219230583ff39113e667f21f788fe0e2dd1d029b8
SHA5124792a96494cb0b56977c1d26b0456ba05e2a499a6fb12dce0752e50da28d25077c3e0b280df8f0029c652d146f7f41be8f4746dfafe2276af731c4f8d9d2bd2b