Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 16:34
Static task
static1
Behavioral task
behavioral1
Sample
0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe
Resource
win7-20240903-en
General
-
Target
0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe
-
Size
96KB
-
MD5
c5061cb02f8a9fcac28699f7c5af3940
-
SHA1
b6a76e05979acb92f7c77e81104666f8b98ea78e
-
SHA256
0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839
-
SHA512
e00b41cb1ad5a2bfcf87af437d78ceb8258b4ab327a7ce44b868f5c791b88ed11af1e17bb8357a8a1c6110c5eba345376065a7945388f7a19800bfe297d40ce6
-
SSDEEP
1536:/nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:/Gs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1272 omsecor.exe 4512 omsecor.exe 2968 omsecor.exe 820 omsecor.exe 2996 omsecor.exe 2964 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1840 set thread context of 1372 1840 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 83 PID 1272 set thread context of 4512 1272 omsecor.exe 87 PID 2968 set thread context of 820 2968 omsecor.exe 111 PID 2996 set thread context of 2964 2996 omsecor.exe 115 -
Program crash 4 IoCs
pid pid_target Process procid_target 2932 1840 WerFault.exe 82 5088 1272 WerFault.exe 86 1388 2968 WerFault.exe 110 4972 2996 WerFault.exe 113 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1372 1840 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 83 PID 1840 wrote to memory of 1372 1840 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 83 PID 1840 wrote to memory of 1372 1840 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 83 PID 1840 wrote to memory of 1372 1840 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 83 PID 1840 wrote to memory of 1372 1840 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 83 PID 1372 wrote to memory of 1272 1372 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 86 PID 1372 wrote to memory of 1272 1372 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 86 PID 1372 wrote to memory of 1272 1372 0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe 86 PID 1272 wrote to memory of 4512 1272 omsecor.exe 87 PID 1272 wrote to memory of 4512 1272 omsecor.exe 87 PID 1272 wrote to memory of 4512 1272 omsecor.exe 87 PID 1272 wrote to memory of 4512 1272 omsecor.exe 87 PID 1272 wrote to memory of 4512 1272 omsecor.exe 87 PID 4512 wrote to memory of 2968 4512 omsecor.exe 110 PID 4512 wrote to memory of 2968 4512 omsecor.exe 110 PID 4512 wrote to memory of 2968 4512 omsecor.exe 110 PID 2968 wrote to memory of 820 2968 omsecor.exe 111 PID 2968 wrote to memory of 820 2968 omsecor.exe 111 PID 2968 wrote to memory of 820 2968 omsecor.exe 111 PID 2968 wrote to memory of 820 2968 omsecor.exe 111 PID 2968 wrote to memory of 820 2968 omsecor.exe 111 PID 820 wrote to memory of 2996 820 omsecor.exe 113 PID 820 wrote to memory of 2996 820 omsecor.exe 113 PID 820 wrote to memory of 2996 820 omsecor.exe 113 PID 2996 wrote to memory of 2964 2996 omsecor.exe 115 PID 2996 wrote to memory of 2964 2996 omsecor.exe 115 PID 2996 wrote to memory of 2964 2996 omsecor.exe 115 PID 2996 wrote to memory of 2964 2996 omsecor.exe 115 PID 2996 wrote to memory of 2964 2996 omsecor.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe"C:\Users\Admin\AppData\Local\Temp\0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exeC:\Users\Admin\AppData\Local\Temp\0d18ad9c113116ec1983be25cc5847505f4be932013364012fbc834cb70fd839N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 2568⤵
- Program crash
PID:4972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 2926⤵
- Program crash
PID:1388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 2884⤵
- Program crash
PID:5088
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 2882⤵
- Program crash
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1840 -ip 18401⤵PID:1308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1272 -ip 12721⤵PID:2144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2968 -ip 29681⤵PID:4344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2996 -ip 29961⤵PID:4592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD548b37ca367fde5c76554b74c110eaa27
SHA16e81301b361856cd301b02242c3d4af808507ec3
SHA25671be9af2a054b8006ddf52fd38cafdd88e611b881f986811433089c20c028dc8
SHA512cf415b36b92f71177bce4dd2310a19755e5278a6f7f838f733f3fe4f3a0e522795c0182c0681b41a2ff64938296833d1b0c8333a6f22502647a27a5e652abfeb
-
Filesize
96KB
MD51f6d1164d853e2b7d8105b844d3e7147
SHA133b7026ef4b95d5da015b48372c3b3480a53cea6
SHA2561fe18aed95ed84c82052e4c62a7cf33e0c6904f8cfdafa833132d7069b6e81ee
SHA512290f35b2422df3149eaba09d2baac57808b04704478d6213fb32d3f76c9a6f787b5a68a5ee439a96fdb495cee0499650276b02e8e650267cccafb0c192a247a9
-
Filesize
96KB
MD5d2de74120d41d0d77b452178a5dfe0af
SHA1b69b3a870296f94452243fb21df394e5950e4fd0
SHA25687c6258d5cff865bc2458120cdcfc1dd5df98e59460c2e699764afcba354e46d
SHA5121462e25e2ed08698e62099bc6041cf04e5e46ca7d8cfb650e1af0a52da0b3249a40f4af703dd4ab2618fa20d6a745a7ae1e2769f52acca20c1047d44cb7c8eb0