Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 20:36
Static task
static1
Behavioral task
behavioral1
Sample
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe
Resource
win7-20240708-en
General
-
Target
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe
-
Size
96KB
-
MD5
3076cf51738ce95e89569894b2fc7b40
-
SHA1
7d60990e226390257d7627dc0bb21ae491a21391
-
SHA256
f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47e
-
SHA512
cc311f8be8e08e1b1fbda869352201283671fedadd89b9fd7b9d3af7591d11d0273a1941793e372b948431f4a8170a687148714f2aee3e17824bfbeffc949d10
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:EGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2508 omsecor.exe 3960 omsecor.exe 4320 omsecor.exe 1376 omsecor.exe 4448 omsecor.exe 4708 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4048 set thread context of 2028 4048 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 83 PID 2508 set thread context of 3960 2508 omsecor.exe 87 PID 4320 set thread context of 1376 4320 omsecor.exe 109 PID 4448 set thread context of 4708 4448 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 2916 2508 WerFault.exe 86 4160 4048 WerFault.exe 82 2128 4320 WerFault.exe 108 3900 4448 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4048 wrote to memory of 2028 4048 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 83 PID 4048 wrote to memory of 2028 4048 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 83 PID 4048 wrote to memory of 2028 4048 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 83 PID 4048 wrote to memory of 2028 4048 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 83 PID 4048 wrote to memory of 2028 4048 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 83 PID 2028 wrote to memory of 2508 2028 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 86 PID 2028 wrote to memory of 2508 2028 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 86 PID 2028 wrote to memory of 2508 2028 f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe 86 PID 2508 wrote to memory of 3960 2508 omsecor.exe 87 PID 2508 wrote to memory of 3960 2508 omsecor.exe 87 PID 2508 wrote to memory of 3960 2508 omsecor.exe 87 PID 2508 wrote to memory of 3960 2508 omsecor.exe 87 PID 2508 wrote to memory of 3960 2508 omsecor.exe 87 PID 3960 wrote to memory of 4320 3960 omsecor.exe 108 PID 3960 wrote to memory of 4320 3960 omsecor.exe 108 PID 3960 wrote to memory of 4320 3960 omsecor.exe 108 PID 4320 wrote to memory of 1376 4320 omsecor.exe 109 PID 4320 wrote to memory of 1376 4320 omsecor.exe 109 PID 4320 wrote to memory of 1376 4320 omsecor.exe 109 PID 4320 wrote to memory of 1376 4320 omsecor.exe 109 PID 4320 wrote to memory of 1376 4320 omsecor.exe 109 PID 1376 wrote to memory of 4448 1376 omsecor.exe 111 PID 1376 wrote to memory of 4448 1376 omsecor.exe 111 PID 1376 wrote to memory of 4448 1376 omsecor.exe 111 PID 4448 wrote to memory of 4708 4448 omsecor.exe 113 PID 4448 wrote to memory of 4708 4448 omsecor.exe 113 PID 4448 wrote to memory of 4708 4448 omsecor.exe 113 PID 4448 wrote to memory of 4708 4448 omsecor.exe 113 PID 4448 wrote to memory of 4708 4448 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe"C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exeC:\Users\Admin\AppData\Local\Temp\f5e99fb8061cf5e593ecb45ce3c4cfe95e1a9e1a0f84814f41b69eaea99cc47eN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 2688⤵
- Program crash
PID:3900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 2926⤵
- Program crash
PID:2128
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2884⤵
- Program crash
PID:2916
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 2882⤵
- Program crash
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4048 -ip 40481⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2508 -ip 25081⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4320 -ip 43201⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4448 -ip 44481⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53e0e4d4d5fffc731d420fe61f20c769d
SHA1515bb8221e0eedbad374f796485a74237ef0d473
SHA2569bbfc9093910dfb2d76e43c3dded8110d582f3cd84a6045441cd6a339f1ebdab
SHA512521f02a9b14fbdfe4285250463f5545cc63649cfd133d0a6dd77513b5e71a4314b5e89944c19b0436fe5fcffa2593ac76e7eb86e97d71210f17e5cccc556c63c
-
Filesize
96KB
MD55380557f87dbdce5df6b891ee51953ca
SHA13bf0eb859e6cf123bb090297e8b99fb23580810a
SHA256cab388cb4ff5ea21173816d2f7f694f83137c0b08ffd51dc20bc3b249173bac6
SHA512729c20863b1f4dbdadff127e4706d4785e6ac721f50afeafb91ec14ff15a94430b11e225848c06df8af06253c808178ff56b70ac268cbe28c0b90bbfdce229ea
-
Filesize
96KB
MD55d28b1ce2414106be79e33cf44ae9326
SHA1e10c58d9bf52c2ec05f08afc18e0f929ea4137d2
SHA25620e048911584d5368855eb8befd13483f78bb58880d93d63f065af024e07bc1e
SHA51286f9f1391f5ea33f91867e932f733ffcbed2fb0835360ca3318b553f1f747f6c45fe0c7b670a03a74f114e996b64719d1bc03b51af4018ba3f59ffa2be816505