Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 13:54
Static task
static1
Behavioral task
behavioral1
Sample
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe
Resource
win7-20240903-en
General
-
Target
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe
-
Size
134KB
-
MD5
fea7ad8323b536783fd6bb0663652f59
-
SHA1
6bed3ae0094ee8fcdb5ce7efa07e1779cb29f9c0
-
SHA256
61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c
-
SHA512
53ab11e1ab5ddec15a48447a85183182e5021078d8f68fec2113f62278ba3e610fd5a415040c094fde1ca1c8f478e7aa53151ec1457035aac31281dcfe0b459b
-
SSDEEP
1536:ADfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi1:2iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3408 omsecor.exe 1032 omsecor.exe 1964 omsecor.exe 1924 omsecor.exe 4588 omsecor.exe 1484 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4000 set thread context of 1068 4000 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 82 PID 3408 set thread context of 1032 3408 omsecor.exe 86 PID 1964 set thread context of 1924 1964 omsecor.exe 100 PID 4588 set thread context of 1484 4588 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 1664 4000 WerFault.exe 81 4284 3408 WerFault.exe 85 5072 1964 WerFault.exe 99 3324 4588 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4000 wrote to memory of 1068 4000 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 82 PID 4000 wrote to memory of 1068 4000 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 82 PID 4000 wrote to memory of 1068 4000 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 82 PID 4000 wrote to memory of 1068 4000 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 82 PID 4000 wrote to memory of 1068 4000 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 82 PID 1068 wrote to memory of 3408 1068 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 85 PID 1068 wrote to memory of 3408 1068 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 85 PID 1068 wrote to memory of 3408 1068 61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe 85 PID 3408 wrote to memory of 1032 3408 omsecor.exe 86 PID 3408 wrote to memory of 1032 3408 omsecor.exe 86 PID 3408 wrote to memory of 1032 3408 omsecor.exe 86 PID 3408 wrote to memory of 1032 3408 omsecor.exe 86 PID 3408 wrote to memory of 1032 3408 omsecor.exe 86 PID 1032 wrote to memory of 1964 1032 omsecor.exe 99 PID 1032 wrote to memory of 1964 1032 omsecor.exe 99 PID 1032 wrote to memory of 1964 1032 omsecor.exe 99 PID 1964 wrote to memory of 1924 1964 omsecor.exe 100 PID 1964 wrote to memory of 1924 1964 omsecor.exe 100 PID 1964 wrote to memory of 1924 1964 omsecor.exe 100 PID 1964 wrote to memory of 1924 1964 omsecor.exe 100 PID 1964 wrote to memory of 1924 1964 omsecor.exe 100 PID 1924 wrote to memory of 4588 1924 omsecor.exe 102 PID 1924 wrote to memory of 4588 1924 omsecor.exe 102 PID 1924 wrote to memory of 4588 1924 omsecor.exe 102 PID 4588 wrote to memory of 1484 4588 omsecor.exe 103 PID 4588 wrote to memory of 1484 4588 omsecor.exe 103 PID 4588 wrote to memory of 1484 4588 omsecor.exe 103 PID 4588 wrote to memory of 1484 4588 omsecor.exe 103 PID 4588 wrote to memory of 1484 4588 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe"C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exeC:\Users\Admin\AppData\Local\Temp\61cea9f34f15f7e1aa3ccea70c87910117128cf63ed841b94773f28c0bcadd3c.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 2688⤵
- Program crash
PID:3324
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 2926⤵
- Program crash
PID:5072
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 2884⤵
- Program crash
PID:4284
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 2882⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4000 -ip 40001⤵PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3408 -ip 34081⤵PID:3280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1964 -ip 19641⤵PID:244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4588 -ip 45881⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD58bbc5dab4b6a5f4e52af08902f95dd4e
SHA1b576d7b1b11bb6a72760837b343351a08ee8c195
SHA256e3828188516670554109e28b51c810ce7c07d7ea7cd5b9f4d8419c1c62a84d00
SHA512991e50d99bf514076ad6beda49785d4a62101fb6d7155c1f69a58eb308592887b6c41c794fde448bc4b832ecbf34fdf806d41afa0440fe9d7e241a2a7bd5fff6
-
Filesize
134KB
MD5c1fe695375d2e048de9f2c2170b0273e
SHA174443b5ab666259067a70bb3a811dd63574a8875
SHA2564aface4922107c79758b239da148407beedfb12280c4a661536a13b462d3ad2c
SHA51268de2172caa59c09e0db3e0e4708a99780ef1ca5ea34e7c5badc746812e6ff29bf1ec06af0c08c8d91e22341f469cca99837bbff519212a0aa4fad07b51b4897
-
Filesize
134KB
MD556ab0e327bf493203638066d2f4d0f24
SHA1967937f76312986dc78cb611f4112d2669d0d8bb
SHA256ba57176c29fb9351fa2b62de8e0bab9ff901b1dabfcb06346ed924fb0ce06482
SHA5122e673778e1785523cc7326025ce1e3c340c5eae4c43da950e00edd92ef6c316955cce0a61ab6bff5e5e36f29ab660d65d2373837fc67d2b2081bc0b55e9da7da