Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 00:25
Static task
static1
Behavioral task
behavioral1
Sample
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
Resource
win7-20240903-en
General
-
Target
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
-
Size
96KB
-
MD5
58d33f08933a68fe8dfd857b5bd6434f
-
SHA1
601fa23dc75c0299947078f922a0cbe01873c7b8
-
SHA256
052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06
-
SHA512
dc84bcbf573b6688593f0de80d606c461aef94d276a1fb50f7c6ce10f6af0a851568798de2e41112988d8d22c255c62b0dfe770a75884d2ca7a61f945ec1fc9e
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx5:EGs8cd8eXlYairZYqMddH135
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2832 omsecor.exe 1188 omsecor.exe 3776 omsecor.exe 2068 omsecor.exe 2044 omsecor.exe 3252 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3204 set thread context of 1208 3204 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 2832 set thread context of 1188 2832 omsecor.exe 87 PID 3776 set thread context of 2068 3776 omsecor.exe 109 PID 2044 set thread context of 3252 2044 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 2376 3204 WerFault.exe 82 2044 2832 WerFault.exe 85 4936 3776 WerFault.exe 108 3104 2044 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3204 wrote to memory of 1208 3204 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 3204 wrote to memory of 1208 3204 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 3204 wrote to memory of 1208 3204 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 3204 wrote to memory of 1208 3204 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 3204 wrote to memory of 1208 3204 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 83 PID 1208 wrote to memory of 2832 1208 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 85 PID 1208 wrote to memory of 2832 1208 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 85 PID 1208 wrote to memory of 2832 1208 052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe 85 PID 2832 wrote to memory of 1188 2832 omsecor.exe 87 PID 2832 wrote to memory of 1188 2832 omsecor.exe 87 PID 2832 wrote to memory of 1188 2832 omsecor.exe 87 PID 2832 wrote to memory of 1188 2832 omsecor.exe 87 PID 2832 wrote to memory of 1188 2832 omsecor.exe 87 PID 1188 wrote to memory of 3776 1188 omsecor.exe 108 PID 1188 wrote to memory of 3776 1188 omsecor.exe 108 PID 1188 wrote to memory of 3776 1188 omsecor.exe 108 PID 3776 wrote to memory of 2068 3776 omsecor.exe 109 PID 3776 wrote to memory of 2068 3776 omsecor.exe 109 PID 3776 wrote to memory of 2068 3776 omsecor.exe 109 PID 3776 wrote to memory of 2068 3776 omsecor.exe 109 PID 3776 wrote to memory of 2068 3776 omsecor.exe 109 PID 2068 wrote to memory of 2044 2068 omsecor.exe 111 PID 2068 wrote to memory of 2044 2068 omsecor.exe 111 PID 2068 wrote to memory of 2044 2068 omsecor.exe 111 PID 2044 wrote to memory of 3252 2044 omsecor.exe 113 PID 2044 wrote to memory of 3252 2044 omsecor.exe 113 PID 2044 wrote to memory of 3252 2044 omsecor.exe 113 PID 2044 wrote to memory of 3252 2044 omsecor.exe 113 PID 2044 wrote to memory of 3252 2044 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe"C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exeC:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 2568⤵
- Program crash
PID:3104
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 2926⤵
- Program crash
PID:4936
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 2884⤵
- Program crash
PID:2044
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 2922⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3204 -ip 32041⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2832 -ip 28321⤵PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3776 -ip 37761⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2044 -ip 20441⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD504e44493ed919f309eb9765da15b8163
SHA1b3bb70e8bf85255f585a01dba7bc7a317d76307a
SHA2569cad8fca8f3d6992128a01cb84e2a594edf8efc839268cd96b33cd6e1ad2619b
SHA512fb5bc21d84df5926acd40f095bd96959135f182823c579fae06ab0d5ad5b42f8a0eb2f1868c7afb68f8bf014f6b97498ed8c504bbec446644e10c78876169408
-
Filesize
96KB
MD5b79b4b851d75cc547408d23a662cccf6
SHA14c275aa8e600d098cb301147242d41df701e1967
SHA25610d7e69ba2de5d19f76e24f3d9a4c5e603f4d7ff9d4c72b2fbf81d9748b6f3fd
SHA512327d88440f6a916ce482c069b0710c034055d922e02df5d57448a14b2573df43e91268efdee925127dafdb60daa911993856a6ce58b453dfc9e3fe5da84aed55
-
Filesize
96KB
MD5d8d413d47dc7ce704c7ea0d673037a3b
SHA17ef1ebde3257df017f550317ae1de13865f49136
SHA2561cefe13aaa1b4f7d432bf9ef59861cfa8e8499d293f363dfb25c7414d1c31925
SHA5123b81fb4b5cc3da3f7c3cc0107548e80bec5b84312294f35630581b0cf7661aa74bdf07f6ec7d163b1f4c1e799666fedff6c0216035007b31fb280d633a50e072