Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 00:19
Static task
static1
Behavioral task
behavioral1
Sample
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
Resource
win7-20240903-en
General
-
Target
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
-
Size
96KB
-
MD5
58d33f08933a68fe8dfd857b5bd6434f
-
SHA1
601fa23dc75c0299947078f922a0cbe01873c7b8
-
SHA256
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06
-
SHA512
dc84bcbf573b6688593f0de80d606c461aef94d276a1fb50f7c6ce10f6af0a851568798de2e41112988d8d22c255c62b0dfe770a75884d2ca7a61f945ec1fc9e
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx5:EGs8cd8eXlYairZYqMddH135
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4860 omsecor.exe 3276 omsecor.exe 3104 omsecor.exe 4280 omsecor.exe 3944 omsecor.exe 1608 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3116 set thread context of 5048 3116 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 4860 set thread context of 3276 4860 omsecor.exe 87 PID 3104 set thread context of 4280 3104 omsecor.exe 108 PID 3944 set thread context of 1608 3944 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4260 3116 WerFault.exe 82 1628 4860 WerFault.exe 85 1688 3104 WerFault.exe 107 4020 3944 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3116 wrote to memory of 5048 3116 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 3116 wrote to memory of 5048 3116 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 3116 wrote to memory of 5048 3116 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 3116 wrote to memory of 5048 3116 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 3116 wrote to memory of 5048 3116 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 5048 wrote to memory of 4860 5048 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 85 PID 5048 wrote to memory of 4860 5048 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 85 PID 5048 wrote to memory of 4860 5048 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 85 PID 4860 wrote to memory of 3276 4860 omsecor.exe 87 PID 4860 wrote to memory of 3276 4860 omsecor.exe 87 PID 4860 wrote to memory of 3276 4860 omsecor.exe 87 PID 4860 wrote to memory of 3276 4860 omsecor.exe 87 PID 4860 wrote to memory of 3276 4860 omsecor.exe 87 PID 3276 wrote to memory of 3104 3276 omsecor.exe 107 PID 3276 wrote to memory of 3104 3276 omsecor.exe 107 PID 3276 wrote to memory of 3104 3276 omsecor.exe 107 PID 3104 wrote to memory of 4280 3104 omsecor.exe 108 PID 3104 wrote to memory of 4280 3104 omsecor.exe 108 PID 3104 wrote to memory of 4280 3104 omsecor.exe 108 PID 3104 wrote to memory of 4280 3104 omsecor.exe 108 PID 3104 wrote to memory of 4280 3104 omsecor.exe 108 PID 4280 wrote to memory of 3944 4280 omsecor.exe 110 PID 4280 wrote to memory of 3944 4280 omsecor.exe 110 PID 4280 wrote to memory of 3944 4280 omsecor.exe 110 PID 3944 wrote to memory of 1608 3944 omsecor.exe 112 PID 3944 wrote to memory of 1608 3944 omsecor.exe 112 PID 3944 wrote to memory of 1608 3944 omsecor.exe 112 PID 3944 wrote to memory of 1608 3944 omsecor.exe 112 PID 3944 wrote to memory of 1608 3944 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe"C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exeC:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 2568⤵
- Program crash
PID:4020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 2926⤵
- Program crash
PID:1688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 3004⤵
- Program crash
PID:1628
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 2882⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3116 -ip 31161⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4860 -ip 48601⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3104 -ip 31041⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3944 -ip 39441⤵PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5097db0fbb4d675790d55ff42c73195d7
SHA11ccae71dcb1d9650b6a0bab2d4a28c716f570f43
SHA2566007d493708249289e544a5f6d73b9758f94f3531bc73a873425e4dd3dcc8016
SHA512bc23556f9ecebb56bcad749063e0c3d10522aec004660725c904c14b235ebe8c871a2cf7cf99e1859913e88a7d69b84ec372ba24727baed1ce2d29ac59039664
-
Filesize
96KB
MD504e44493ed919f309eb9765da15b8163
SHA1b3bb70e8bf85255f585a01dba7bc7a317d76307a
SHA2569cad8fca8f3d6992128a01cb84e2a594edf8efc839268cd96b33cd6e1ad2619b
SHA512fb5bc21d84df5926acd40f095bd96959135f182823c579fae06ab0d5ad5b42f8a0eb2f1868c7afb68f8bf014f6b97498ed8c504bbec446644e10c78876169408
-
Filesize
96KB
MD5bd5d15cd4e63d5596ddcf77841f00129
SHA1070b16230fa59d32a0c80fafcec28e73ff8048f7
SHA256bcce5b631fb3a2d7e3ec1e9abe3f98c8b099d2887db16f513695747cc627600b
SHA512641ae9d43c3edcc7a8952240efcb7a95f99eb155f3290be5cfe5b2156afb4d9e265fd0539956706737ffc14ecedcf7a8c965045da27ca856b52510cb44688130