Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 08:55
Static task
static1
Behavioral task
behavioral1
Sample
aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe
Resource
win7-20240729-en
General
-
Target
aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe
-
Size
96KB
-
MD5
c3ba66124b5c044d8490874363f44c85
-
SHA1
c218c4b47009ed83a0c97278229f734fd36d73f8
-
SHA256
aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480
-
SHA512
701e42fa4d529790c8585d0d97430b9bf6a82f2dccb2725105d44824fb7ed536378dfce643131838e72d719e5aa569f143a6ef5053e1296e8738bf1abc2f31c6
-
SSDEEP
1536:lnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxZ:lGs8cd8eXlYairZYqMddH13Z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2128 omsecor.exe 3784 omsecor.exe 2480 omsecor.exe 1840 omsecor.exe 2544 omsecor.exe 2224 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 560 set thread context of 3008 560 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 84 PID 2128 set thread context of 3784 2128 omsecor.exe 88 PID 2480 set thread context of 1840 2480 omsecor.exe 102 PID 2544 set thread context of 2224 2544 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 2208 560 WerFault.exe 83 2896 2128 WerFault.exe 86 4488 2480 WerFault.exe 101 3656 2544 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 560 wrote to memory of 3008 560 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 84 PID 560 wrote to memory of 3008 560 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 84 PID 560 wrote to memory of 3008 560 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 84 PID 560 wrote to memory of 3008 560 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 84 PID 560 wrote to memory of 3008 560 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 84 PID 3008 wrote to memory of 2128 3008 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 86 PID 3008 wrote to memory of 2128 3008 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 86 PID 3008 wrote to memory of 2128 3008 aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe 86 PID 2128 wrote to memory of 3784 2128 omsecor.exe 88 PID 2128 wrote to memory of 3784 2128 omsecor.exe 88 PID 2128 wrote to memory of 3784 2128 omsecor.exe 88 PID 2128 wrote to memory of 3784 2128 omsecor.exe 88 PID 2128 wrote to memory of 3784 2128 omsecor.exe 88 PID 3784 wrote to memory of 2480 3784 omsecor.exe 101 PID 3784 wrote to memory of 2480 3784 omsecor.exe 101 PID 3784 wrote to memory of 2480 3784 omsecor.exe 101 PID 2480 wrote to memory of 1840 2480 omsecor.exe 102 PID 2480 wrote to memory of 1840 2480 omsecor.exe 102 PID 2480 wrote to memory of 1840 2480 omsecor.exe 102 PID 2480 wrote to memory of 1840 2480 omsecor.exe 102 PID 2480 wrote to memory of 1840 2480 omsecor.exe 102 PID 1840 wrote to memory of 2544 1840 omsecor.exe 104 PID 1840 wrote to memory of 2544 1840 omsecor.exe 104 PID 1840 wrote to memory of 2544 1840 omsecor.exe 104 PID 2544 wrote to memory of 2224 2544 omsecor.exe 106 PID 2544 wrote to memory of 2224 2544 omsecor.exe 106 PID 2544 wrote to memory of 2224 2544 omsecor.exe 106 PID 2544 wrote to memory of 2224 2544 omsecor.exe 106 PID 2544 wrote to memory of 2224 2544 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe"C:\Users\Admin\AppData\Local\Temp\aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exeC:\Users\Admin\AppData\Local\Temp\aae06b61ed06d33987c70fac2b9234b09ea73612432f7118d0bc0819e980d480.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 2448⤵
- Program crash
PID:3656
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 2926⤵
- Program crash
PID:4488
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 2884⤵
- Program crash
PID:2896
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 2882⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 560 -ip 5601⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2128 -ip 21281⤵PID:3884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2480 -ip 24801⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2544 -ip 25441⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f2369becf6e90464421ed7e0a50c668c
SHA1d9932a62c830985252e186c6d1d4f9f1a7fe6711
SHA256139cde5e3a99ac935fa10b803aa6b3cfec04f863b02483d8436a934cb209ab77
SHA512e53d9833f6289c59d40120fd067643d31e0ce26f8dee6f65bedc451ba34770cb4aa92f79cc8ef8aa0267a9e19b92c4fef8f583ee6716526201667eb02f7ccd8a
-
Filesize
96KB
MD50301705ee6f6e4f555c232bd1cf7135d
SHA1ad79d01bc50eb1ce7a3ee18a14e0f2b0ee974bae
SHA25690579ff960ceaeaa56356659abf95370adca4fc33087e0f5144a6ea98313f1a9
SHA5120a269a44dd1a7af1349f4b82845cd5cbfb1958c05e3542570b751f8504d08da148c9a91710d823a1ba9683409ecdc2ed297c8c87ff543ec6d3fa07a5cdecae46
-
Filesize
96KB
MD597b322aa1d9aff110d2cbdb03deb396a
SHA196143e391192c8b01f57c3f3242b7ac8ee2509cf
SHA256bb7b1f79e5f1e791dbfbbd42d680390cc613d5ab276d7a5f18d2fc36abcf3f25
SHA51248d35d98c4126e81850ca1c2e2986902a09bcab74cadc525c6b76e7801f385bcf56f0569dfaf202bd630ec17426682edf6c37cc6fab6e77bfb376f03f6116e69