Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 13:50
Static task
static1
Behavioral task
behavioral1
Sample
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe
Resource
win7-20241010-en
General
-
Target
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe
-
Size
134KB
-
MD5
fea7ad8323b536783fd6bb0663652f59
-
SHA1
6bed3ae0094ee8fcdb5ce7efa07e1779cb29f9c0
-
SHA256
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c
-
SHA512
53ab11e1ab5ddec15a48447a85183182e5021078d8f68fec2113f62278ba3e610fd5a415040c094fde1ca1c8f478e7aa53151ec1457035aac31281dcfe0b459b
-
SSDEEP
1536:ADfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi1:2iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3032 omsecor.exe 4032 omsecor.exe 1720 omsecor.exe 4588 omsecor.exe 3420 omsecor.exe 4428 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3332 set thread context of 4892 3332 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 83 PID 3032 set thread context of 4032 3032 omsecor.exe 88 PID 1720 set thread context of 4588 1720 omsecor.exe 108 PID 3420 set thread context of 4428 3420 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 3788 3332 WerFault.exe 82 768 3032 WerFault.exe 86 2152 1720 WerFault.exe 107 2908 3420 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3332 wrote to memory of 4892 3332 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 83 PID 3332 wrote to memory of 4892 3332 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 83 PID 3332 wrote to memory of 4892 3332 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 83 PID 3332 wrote to memory of 4892 3332 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 83 PID 3332 wrote to memory of 4892 3332 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 83 PID 4892 wrote to memory of 3032 4892 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 86 PID 4892 wrote to memory of 3032 4892 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 86 PID 4892 wrote to memory of 3032 4892 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 86 PID 3032 wrote to memory of 4032 3032 omsecor.exe 88 PID 3032 wrote to memory of 4032 3032 omsecor.exe 88 PID 3032 wrote to memory of 4032 3032 omsecor.exe 88 PID 3032 wrote to memory of 4032 3032 omsecor.exe 88 PID 3032 wrote to memory of 4032 3032 omsecor.exe 88 PID 4032 wrote to memory of 1720 4032 omsecor.exe 107 PID 4032 wrote to memory of 1720 4032 omsecor.exe 107 PID 4032 wrote to memory of 1720 4032 omsecor.exe 107 PID 1720 wrote to memory of 4588 1720 omsecor.exe 108 PID 1720 wrote to memory of 4588 1720 omsecor.exe 108 PID 1720 wrote to memory of 4588 1720 omsecor.exe 108 PID 1720 wrote to memory of 4588 1720 omsecor.exe 108 PID 1720 wrote to memory of 4588 1720 omsecor.exe 108 PID 4588 wrote to memory of 3420 4588 omsecor.exe 110 PID 4588 wrote to memory of 3420 4588 omsecor.exe 110 PID 4588 wrote to memory of 3420 4588 omsecor.exe 110 PID 3420 wrote to memory of 4428 3420 omsecor.exe 111 PID 3420 wrote to memory of 4428 3420 omsecor.exe 111 PID 3420 wrote to memory of 4428 3420 omsecor.exe 111 PID 3420 wrote to memory of 4428 3420 omsecor.exe 111 PID 3420 wrote to memory of 4428 3420 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe"C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exeC:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 2688⤵
- Program crash
PID:2908
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 3006⤵
- Program crash
PID:2152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 2884⤵
- Program crash
PID:768
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 2882⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3332 -ip 33321⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3032 -ip 30321⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1720 -ip 17201⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3420 -ip 34201⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD55e662f15a3a8a76bad0a2ba28ee5e322
SHA1cf2b0f60b04d34b67be4cabb67b6ed0ecc6246ce
SHA256f446c388080dfaff4d18a0bcca701326595793c0790474b093ee0642cdbce9cd
SHA512e1b79f3c895773bc993e5746f8c2ab8f61a15f6891b8c0379badfdaaacac90c66aeabc717cd4c44f0bd416a65b03bd3eafa0b70a542e3851d000eede6e2c5115
-
Filesize
134KB
MD5c1fe695375d2e048de9f2c2170b0273e
SHA174443b5ab666259067a70bb3a811dd63574a8875
SHA2564aface4922107c79758b239da148407beedfb12280c4a661536a13b462d3ad2c
SHA51268de2172caa59c09e0db3e0e4708a99780ef1ca5ea34e7c5badc746812e6ff29bf1ec06af0c08c8d91e22341f469cca99837bbff519212a0aa4fad07b51b4897
-
Filesize
134KB
MD5b560737d03b8d619ad205b4d7557969a
SHA1b8c26968801095141e78524adf4ecfc213c177ac
SHA2569605e343971eba924bdd7b0a2d34e2e6701c4eb37c7b43589a9d17bc0aee5747
SHA512594235d9bdb4bd6df3d8e493e8e8d47be8233e5983380c4898220043b8556c623558e2593cc3267c04089363a1fd6b92ab2274e36f6d7aa8e30e0db4807fd46e