Analysis
-
max time kernel
114s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 22:11
Static task
static1
Behavioral task
behavioral1
Sample
7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe
Resource
win7-20240903-en
General
-
Target
7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe
-
Size
96KB
-
MD5
bc3605cf527687ece09deda62011fe30
-
SHA1
17e76cae976757717c6f95ee80865852bc19dd47
-
SHA256
7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8eb
-
SHA512
769481f7c9784712b0348ac5d8a97eeaa59f1d23a754d86210eab3a233a498375f0fa629349d502c901737247d90b696e5f63ffa805d2cd14a775e816f09f51b
-
SSDEEP
1536:pnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:pGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3124 omsecor.exe 4056 omsecor.exe 840 omsecor.exe 1688 omsecor.exe 1656 omsecor.exe 4208 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 544 set thread context of 1772 544 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 82 PID 3124 set thread context of 4056 3124 omsecor.exe 87 PID 840 set thread context of 1688 840 omsecor.exe 100 PID 1656 set thread context of 4208 1656 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 4920 544 WerFault.exe 81 5008 3124 WerFault.exe 85 532 840 WerFault.exe 99 2640 1656 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 544 wrote to memory of 1772 544 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 82 PID 544 wrote to memory of 1772 544 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 82 PID 544 wrote to memory of 1772 544 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 82 PID 544 wrote to memory of 1772 544 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 82 PID 544 wrote to memory of 1772 544 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 82 PID 1772 wrote to memory of 3124 1772 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 85 PID 1772 wrote to memory of 3124 1772 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 85 PID 1772 wrote to memory of 3124 1772 7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe 85 PID 3124 wrote to memory of 4056 3124 omsecor.exe 87 PID 3124 wrote to memory of 4056 3124 omsecor.exe 87 PID 3124 wrote to memory of 4056 3124 omsecor.exe 87 PID 3124 wrote to memory of 4056 3124 omsecor.exe 87 PID 3124 wrote to memory of 4056 3124 omsecor.exe 87 PID 4056 wrote to memory of 840 4056 omsecor.exe 99 PID 4056 wrote to memory of 840 4056 omsecor.exe 99 PID 4056 wrote to memory of 840 4056 omsecor.exe 99 PID 840 wrote to memory of 1688 840 omsecor.exe 100 PID 840 wrote to memory of 1688 840 omsecor.exe 100 PID 840 wrote to memory of 1688 840 omsecor.exe 100 PID 840 wrote to memory of 1688 840 omsecor.exe 100 PID 840 wrote to memory of 1688 840 omsecor.exe 100 PID 1688 wrote to memory of 1656 1688 omsecor.exe 102 PID 1688 wrote to memory of 1656 1688 omsecor.exe 102 PID 1688 wrote to memory of 1656 1688 omsecor.exe 102 PID 1656 wrote to memory of 4208 1656 omsecor.exe 103 PID 1656 wrote to memory of 4208 1656 omsecor.exe 103 PID 1656 wrote to memory of 4208 1656 omsecor.exe 103 PID 1656 wrote to memory of 4208 1656 omsecor.exe 103 PID 1656 wrote to memory of 4208 1656 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe"C:\Users\Admin\AppData\Local\Temp\7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exeC:\Users\Admin\AppData\Local\Temp\7477b1e11ef2df625c00fefe47f6655dcd987b6ce9e3f5db612079f59518e8ebN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 2568⤵
- Program crash
PID:2640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 2966⤵
- Program crash
PID:532
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 3004⤵
- Program crash
PID:5008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 3002⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 544 -ip 5441⤵PID:1528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3124 -ip 31241⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 840 -ip 8401⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1656 -ip 16561⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55f8eb22480d1a0477d7b5acbd9da9680
SHA137b5493b9a8d2ac68a36c68a37a00d1cfff4164f
SHA256e92692dd204e58a3bf4dfe932cb1f52af8c47b49516522ea82834c85b597ef2b
SHA5129b6b4b171a2cc3c134d16b10d58376b2ebaa0dfba4a657c430f7b27b11e39e47a7601021614f3550d65098e065502ed86e0b36c14a64d9025c4a6b0307d88408
-
Filesize
96KB
MD50cb9f74c541b920fc018c7fbf3716dcb
SHA199458ce1855d7a90cc5bf90adaee4c2cfc523d8e
SHA2561bef612b24fe5ea992ad9e9c9bcdf989c07083fa6adc0d3793deb5b02edd908f
SHA512d01c737e03f860e5c3870f9a338c2061f1a70ed3591196d2238f45219d968a5bb42441618bc85f3e4c2ef6a918670d4bf1a7eb97f831cf49d1a80caee87460cb
-
Filesize
96KB
MD5aec8b5cae13b8470ac30a27892ab703e
SHA1646087cc90e8def1dd34454971e184f125cad559
SHA2569014e174a9cd9efebc6c95fd827c279d76933d18ad985cf357a5b44af69b099a
SHA5126698809131af5ee90b725977ed041fa7e31eb11def6de4cbf88e4f2dc63612a5584f0beccc9ae1ec1162931c3401e7be8b70dd1323cdfab269a4e6ebd43d4740