Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 19:38
Static task
static1
Behavioral task
behavioral1
Sample
0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe
Resource
win7-20241023-en
General
-
Target
0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe
-
Size
96KB
-
MD5
d1089bf6eeff7a890d0757d7e20e5cbc
-
SHA1
efc1a74abe9efface024d2e3b19723e0ce383ceb
-
SHA256
0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896
-
SHA512
a44f7521b15744450ed40d0ee1d067c9808d58f6014b882409e5458d5a3d786a2f7d26ba4b07cbdd1ef241592739d313e5bb710895f00e31d45afe92c03d1a59
-
SSDEEP
1536:1nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:1Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1128 omsecor.exe 3264 omsecor.exe 2448 omsecor.exe 1960 omsecor.exe 3248 omsecor.exe 4600 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3172 set thread context of 5052 3172 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 83 PID 1128 set thread context of 3264 1128 omsecor.exe 87 PID 2448 set thread context of 1960 2448 omsecor.exe 108 PID 3248 set thread context of 4600 3248 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 768 3172 WerFault.exe 82 772 1128 WerFault.exe 85 732 2448 WerFault.exe 107 3544 3248 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3172 wrote to memory of 5052 3172 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 83 PID 3172 wrote to memory of 5052 3172 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 83 PID 3172 wrote to memory of 5052 3172 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 83 PID 3172 wrote to memory of 5052 3172 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 83 PID 3172 wrote to memory of 5052 3172 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 83 PID 5052 wrote to memory of 1128 5052 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 85 PID 5052 wrote to memory of 1128 5052 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 85 PID 5052 wrote to memory of 1128 5052 0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe 85 PID 1128 wrote to memory of 3264 1128 omsecor.exe 87 PID 1128 wrote to memory of 3264 1128 omsecor.exe 87 PID 1128 wrote to memory of 3264 1128 omsecor.exe 87 PID 1128 wrote to memory of 3264 1128 omsecor.exe 87 PID 1128 wrote to memory of 3264 1128 omsecor.exe 87 PID 3264 wrote to memory of 2448 3264 omsecor.exe 107 PID 3264 wrote to memory of 2448 3264 omsecor.exe 107 PID 3264 wrote to memory of 2448 3264 omsecor.exe 107 PID 2448 wrote to memory of 1960 2448 omsecor.exe 108 PID 2448 wrote to memory of 1960 2448 omsecor.exe 108 PID 2448 wrote to memory of 1960 2448 omsecor.exe 108 PID 2448 wrote to memory of 1960 2448 omsecor.exe 108 PID 2448 wrote to memory of 1960 2448 omsecor.exe 108 PID 1960 wrote to memory of 3248 1960 omsecor.exe 110 PID 1960 wrote to memory of 3248 1960 omsecor.exe 110 PID 1960 wrote to memory of 3248 1960 omsecor.exe 110 PID 3248 wrote to memory of 4600 3248 omsecor.exe 112 PID 3248 wrote to memory of 4600 3248 omsecor.exe 112 PID 3248 wrote to memory of 4600 3248 omsecor.exe 112 PID 3248 wrote to memory of 4600 3248 omsecor.exe 112 PID 3248 wrote to memory of 4600 3248 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe"C:\Users\Admin\AppData\Local\Temp\0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exeC:\Users\Admin\AppData\Local\Temp\0b12e29b9752eeb4790ff38e7fb500064174730d83c91e5c2677cfdc22eb0896.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 2568⤵
- Program crash
PID:3544
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 2926⤵
- Program crash
PID:732
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 2884⤵
- Program crash
PID:772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 2882⤵
- Program crash
PID:768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3172 -ip 31721⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1128 -ip 11281⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2448 -ip 24481⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3248 -ip 32481⤵PID:2232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5741d94a4e2e99f04e0ef558e9fdbfc53
SHA10bcc87ce92aedb13c33e0ab18fbf4b46a5d757a2
SHA256ee9f1c69072332bc955fc5fdabc1edd544984af5fb649e094f1a5b7f191e03d8
SHA512f767cf7aedee1f40a70e20543a7eaee358e0cd0c4d1b350db650890fb1345b630fcf029554cc85d21a66bda13863438edac9672e8696949b547ad6555b8ee936
-
Filesize
96KB
MD5f41db0ae240c8ac36f974bc8af6937ff
SHA1f98cbdfdb644c5210519e386f37311caa6c555ff
SHA2565ffd1065108b397345194b9a84034769ee90a0209a083e3340a65027e86e5033
SHA512e5d5c69dc0746fd76c1a910f6aed8eb97a94b71f8d60c52e1ddb9e8e7988aa9b559205f2433a62022b24272117374106f0c59d28dda35f2a4db3bfae93637769
-
Filesize
96KB
MD585d5660b0e408da259cc245485edb6aa
SHA1c43e7ed9b378ab6154d2f6dbb34dee42b0b56e20
SHA2569317cbe7791a4c253525bb72e646f7996ae9547edb42097b883e3a38690f1d11
SHA512be1759557c169ab49a260fab1638efb13b75814400626364b5676417d750ec5ccb7de5d9ab1207a84becff8acc15245f413519d04ee0468648b2acbcebbca68c