Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 10:29
Static task
static1
Behavioral task
behavioral1
Sample
f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe
Resource
win7-20240903-en
General
-
Target
f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe
-
Size
96KB
-
MD5
b31153cf408fccc14297b6f43e514640
-
SHA1
085eeae4d04bf3a083e4984a65dadd732ab5c2a3
-
SHA256
f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87
-
SHA512
0707d619f1bce898564b39c6fcbb9cb544890a27b74f6baff6e9a4d1d6aadfde00f621f09681791039d2a13f337b45a88ec60bbcd6d226f6fb9918b9173e18b2
-
SSDEEP
1536:lnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:lGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4028 omsecor.exe 1120 omsecor.exe 2680 omsecor.exe 4808 omsecor.exe 1068 omsecor.exe 3624 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2216 set thread context of 3272 2216 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 83 PID 4028 set thread context of 1120 4028 omsecor.exe 87 PID 2680 set thread context of 4808 2680 omsecor.exe 107 PID 1068 set thread context of 3624 1068 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 3548 4028 WerFault.exe 86 3716 2216 WerFault.exe 82 4224 2680 WerFault.exe 106 2612 1068 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2216 wrote to memory of 3272 2216 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 83 PID 2216 wrote to memory of 3272 2216 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 83 PID 2216 wrote to memory of 3272 2216 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 83 PID 2216 wrote to memory of 3272 2216 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 83 PID 2216 wrote to memory of 3272 2216 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 83 PID 3272 wrote to memory of 4028 3272 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 86 PID 3272 wrote to memory of 4028 3272 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 86 PID 3272 wrote to memory of 4028 3272 f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe 86 PID 4028 wrote to memory of 1120 4028 omsecor.exe 87 PID 4028 wrote to memory of 1120 4028 omsecor.exe 87 PID 4028 wrote to memory of 1120 4028 omsecor.exe 87 PID 4028 wrote to memory of 1120 4028 omsecor.exe 87 PID 4028 wrote to memory of 1120 4028 omsecor.exe 87 PID 1120 wrote to memory of 2680 1120 omsecor.exe 106 PID 1120 wrote to memory of 2680 1120 omsecor.exe 106 PID 1120 wrote to memory of 2680 1120 omsecor.exe 106 PID 2680 wrote to memory of 4808 2680 omsecor.exe 107 PID 2680 wrote to memory of 4808 2680 omsecor.exe 107 PID 2680 wrote to memory of 4808 2680 omsecor.exe 107 PID 2680 wrote to memory of 4808 2680 omsecor.exe 107 PID 2680 wrote to memory of 4808 2680 omsecor.exe 107 PID 4808 wrote to memory of 1068 4808 omsecor.exe 109 PID 4808 wrote to memory of 1068 4808 omsecor.exe 109 PID 4808 wrote to memory of 1068 4808 omsecor.exe 109 PID 1068 wrote to memory of 3624 1068 omsecor.exe 111 PID 1068 wrote to memory of 3624 1068 omsecor.exe 111 PID 1068 wrote to memory of 3624 1068 omsecor.exe 111 PID 1068 wrote to memory of 3624 1068 omsecor.exe 111 PID 1068 wrote to memory of 3624 1068 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe"C:\Users\Admin\AppData\Local\Temp\f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exeC:\Users\Admin\AppData\Local\Temp\f3eb9e4768684f44ab5dd8bc53d7c960ffb8a1403500aac361bc68daa2f95a87N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 2688⤵
- Program crash
PID:2612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 2966⤵
- Program crash
PID:4224
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 2964⤵
- Program crash
PID:3548
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 2722⤵
- Program crash
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2216 -ip 22161⤵PID:920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4028 -ip 40281⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2680 -ip 26801⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1068 -ip 10681⤵PID:4448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD591750ab944c1c3ed87db2ca1f470e2ff
SHA1d205f58c8758e3522dfd3d823e61fb63696208bd
SHA256fe6e0da767135c98c0df2165169c3c2e0d843ea2dda7b17597722bb1624d59f7
SHA51291d06f452219e5fbf6216b5333847216ac4ca5eb02b6ada148de0f8c0c1cb8059fc0bd9bc92e9afbcf2a917597fa89e245e39dc635e236d4fe4d2836f89e83c0
-
Filesize
96KB
MD5747e770aa0d155bef88d67b3e6a9782b
SHA185cf8d34488e9611d5b21a4f74074c127e79aa10
SHA2561a5bb84a544f98ce01402ebbd8eb018f4a526bc45899ccc1f18f0023ef1c8342
SHA51282cd2d4faa174f55f9897ddde80b8d29437bc99c219c7f123e40af5c3c4030007f107ef23725b952473c3fd6e50b3d32bc84fe338d459b5b91b56faaeca7fbca
-
Filesize
96KB
MD58b3d476fd9cf74a68e765e2ce597f83c
SHA1ef3829683eb8016d321801fcfa1696798fb67c72
SHA256449687adb4a1f4913c699461ea0a36932cbaf478528e40a6688db18efb7bf14a
SHA5129b777e39d63c3882cc73105ab9b08275918d95a491f6fdc95d1e12be9d4b809a2faf442f9e56e0170039476c7355b2c340997b4aba0e955edea447c4f3d15ac6