Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 17:42
Static task
static1
Behavioral task
behavioral1
Sample
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe
Resource
win7-20240903-en
General
-
Target
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe
-
Size
134KB
-
MD5
0a197348ada0a4dbe7930fa2d7661220
-
SHA1
a5422ec34634bffcd6c46770c73015b2fda886dc
-
SHA256
a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380
-
SHA512
90fe6f284f79058ffa792217562c2062f5d17dc0fe1543dbfb02c604519e0fa6c9ee0783bdb2b6edf3a21d0aa39ad106a49f8e807a396c9d630b7bc29fc83cb3
-
SSDEEP
1536:GDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCin:4iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1388 omsecor.exe 1140 omsecor.exe 3700 omsecor.exe 4964 omsecor.exe 4408 omsecor.exe 1752 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3172 set thread context of 4396 3172 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 85 PID 1388 set thread context of 1140 1388 omsecor.exe 89 PID 3700 set thread context of 4964 3700 omsecor.exe 110 PID 4408 set thread context of 1752 4408 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 4280 1388 WerFault.exe 87 2824 3172 WerFault.exe 84 3480 3700 WerFault.exe 109 2980 4408 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3172 wrote to memory of 4396 3172 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 85 PID 3172 wrote to memory of 4396 3172 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 85 PID 3172 wrote to memory of 4396 3172 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 85 PID 3172 wrote to memory of 4396 3172 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 85 PID 3172 wrote to memory of 4396 3172 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 85 PID 4396 wrote to memory of 1388 4396 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 87 PID 4396 wrote to memory of 1388 4396 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 87 PID 4396 wrote to memory of 1388 4396 a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe 87 PID 1388 wrote to memory of 1140 1388 omsecor.exe 89 PID 1388 wrote to memory of 1140 1388 omsecor.exe 89 PID 1388 wrote to memory of 1140 1388 omsecor.exe 89 PID 1388 wrote to memory of 1140 1388 omsecor.exe 89 PID 1388 wrote to memory of 1140 1388 omsecor.exe 89 PID 1140 wrote to memory of 3700 1140 omsecor.exe 109 PID 1140 wrote to memory of 3700 1140 omsecor.exe 109 PID 1140 wrote to memory of 3700 1140 omsecor.exe 109 PID 3700 wrote to memory of 4964 3700 omsecor.exe 110 PID 3700 wrote to memory of 4964 3700 omsecor.exe 110 PID 3700 wrote to memory of 4964 3700 omsecor.exe 110 PID 3700 wrote to memory of 4964 3700 omsecor.exe 110 PID 3700 wrote to memory of 4964 3700 omsecor.exe 110 PID 4964 wrote to memory of 4408 4964 omsecor.exe 112 PID 4964 wrote to memory of 4408 4964 omsecor.exe 112 PID 4964 wrote to memory of 4408 4964 omsecor.exe 112 PID 4408 wrote to memory of 1752 4408 omsecor.exe 114 PID 4408 wrote to memory of 1752 4408 omsecor.exe 114 PID 4408 wrote to memory of 1752 4408 omsecor.exe 114 PID 4408 wrote to memory of 1752 4408 omsecor.exe 114 PID 4408 wrote to memory of 1752 4408 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe"C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exeC:\Users\Admin\AppData\Local\Temp\a4eb1196040e7f78b601645c9906246f1b688566b61cb11fcf3882215d5b4380.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 2568⤵
- Program crash
PID:2980
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 2926⤵
- Program crash
PID:3480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 2884⤵
- Program crash
PID:4280
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 3002⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3172 -ip 31721⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1388 -ip 13881⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3700 -ip 37001⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4408 -ip 44081⤵PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD59c721c4e93473e7cdb0ec933ccc50578
SHA122c71cac2a810d0c433547d1da2d82f2fc226031
SHA256133a053bc87174191b45023e25664d8f5b9c5817a7f44a2ed386cadef41d92bb
SHA512529ba1465979a14df5b84784cf835e592a80bd27027b21e09aaa22de023af779c2812137c9877791a626efd31e20731d3b3a55f195ec815cafa23b08a168eebb
-
Filesize
134KB
MD535414596d1f915ca0f0f8ccaa1a9429b
SHA17d010efce9080f3a25c6df15167d5360b5dbbcb6
SHA256e31c5b425414540747db8073b025a5d5c1ce71042db27e1bec3b1b520666c2af
SHA512c32d1a7c9bf7b7ee0158dc98f89025b760895771ed75b13ad0c0f5e5b736c01679ca3c5a48ec9b0b57a83cddbdb949bfb485c57a096bced812a8435dbe21206c
-
Filesize
134KB
MD538dcf53f6f7e538e4ca7f6bebdc6252f
SHA1a2b754fad8d2e516c79d8cb4285d860488fbd09a
SHA256d1d0ef1b9b4232d401934ad332291e19d0a36dbea11f7911ad325b864d61ff01
SHA51259e867647f0bdd781c2a2f0bb30fbeac98ca48e090d8b6c9f87af758f0d81af237b2647738b3453a64e3ceb05bcb2985116d8414c1087681fff583a407e0ddf3