Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 17:38
Static task
static1
Behavioral task
behavioral1
Sample
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe
Resource
win7-20240903-en
General
-
Target
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe
-
Size
134KB
-
MD5
0a197348ada0a4dbe7930fa2d7661220
-
SHA1
a5422ec34634bffcd6c46770c73015b2fda886dc
-
SHA256
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380
-
SHA512
90fe6f284f79058ffa792217562c2062f5d17dc0fe1543dbfb02c604519e0fa6c9ee0783bdb2b6edf3a21d0aa39ad106a49f8e807a396c9d630b7bc29fc83cb3
-
SSDEEP
1536:GDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCin:4iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1392 omsecor.exe 4512 omsecor.exe 4256 omsecor.exe 5084 omsecor.exe 5088 omsecor.exe 1904 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4812 set thread context of 3908 4812 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 84 PID 1392 set thread context of 4512 1392 omsecor.exe 89 PID 4256 set thread context of 5084 4256 omsecor.exe 110 PID 5088 set thread context of 1904 5088 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 2416 4812 WerFault.exe 83 3436 1392 WerFault.exe 86 1248 4256 WerFault.exe 109 384 5088 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3908 4812 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 84 PID 4812 wrote to memory of 3908 4812 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 84 PID 4812 wrote to memory of 3908 4812 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 84 PID 4812 wrote to memory of 3908 4812 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 84 PID 4812 wrote to memory of 3908 4812 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 84 PID 3908 wrote to memory of 1392 3908 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 86 PID 3908 wrote to memory of 1392 3908 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 86 PID 3908 wrote to memory of 1392 3908 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 86 PID 1392 wrote to memory of 4512 1392 omsecor.exe 89 PID 1392 wrote to memory of 4512 1392 omsecor.exe 89 PID 1392 wrote to memory of 4512 1392 omsecor.exe 89 PID 1392 wrote to memory of 4512 1392 omsecor.exe 89 PID 1392 wrote to memory of 4512 1392 omsecor.exe 89 PID 4512 wrote to memory of 4256 4512 omsecor.exe 109 PID 4512 wrote to memory of 4256 4512 omsecor.exe 109 PID 4512 wrote to memory of 4256 4512 omsecor.exe 109 PID 4256 wrote to memory of 5084 4256 omsecor.exe 110 PID 4256 wrote to memory of 5084 4256 omsecor.exe 110 PID 4256 wrote to memory of 5084 4256 omsecor.exe 110 PID 4256 wrote to memory of 5084 4256 omsecor.exe 110 PID 4256 wrote to memory of 5084 4256 omsecor.exe 110 PID 5084 wrote to memory of 5088 5084 omsecor.exe 112 PID 5084 wrote to memory of 5088 5084 omsecor.exe 112 PID 5084 wrote to memory of 5088 5084 omsecor.exe 112 PID 5088 wrote to memory of 1904 5088 omsecor.exe 114 PID 5088 wrote to memory of 1904 5088 omsecor.exe 114 PID 5088 wrote to memory of 1904 5088 omsecor.exe 114 PID 5088 wrote to memory of 1904 5088 omsecor.exe 114 PID 5088 wrote to memory of 1904 5088 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe"C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exeC:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 2568⤵
- Program crash
PID:384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 2926⤵
- Program crash
PID:1248
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 2564⤵
- Program crash
PID:3436
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 2882⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4812 -ip 48121⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1392 -ip 13921⤵PID:2908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4256 -ip 42561⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5088 -ip 50881⤵PID:3128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD54eb683b4db413a0400c39d2f004892c1
SHA164f5b25da2657aac1d577624811ee5d6dda5ef5f
SHA25624165b037128380248cc795a4921031c80f0b03b9770f4da4f2f9a4024933a49
SHA512c9c5e56fa56eaa780ed9f9a3056407fbe3f83fe0314fc83ba53230a0c09694d182d3a373cf7b43291880fe0d2a5ecd40ad5e9a535b43ecccc1596aeae86f576f
-
Filesize
134KB
MD535414596d1f915ca0f0f8ccaa1a9429b
SHA17d010efce9080f3a25c6df15167d5360b5dbbcb6
SHA256e31c5b425414540747db8073b025a5d5c1ce71042db27e1bec3b1b520666c2af
SHA512c32d1a7c9bf7b7ee0158dc98f89025b760895771ed75b13ad0c0f5e5b736c01679ca3c5a48ec9b0b57a83cddbdb949bfb485c57a096bced812a8435dbe21206c
-
Filesize
134KB
MD545af1872eddd7cbf1b1ad18ba7eaea30
SHA1375d35ae45484ac21e024fcc4ff9c0e37221c07b
SHA256d4ff44746174a7aac324e265a6bac89dc06501c9a1a225bdec8d94685a4a5f46
SHA51246c1a36ccf4cce1f43bd276b829f578565fc477cc9a03d31ceedab8f52e7b46c7e0e766b043e6d61938f5a1ebcccd77d308d91ffeb37129a2850d67d9fc9590a