Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 05:42
Static task
static1
Behavioral task
behavioral1
Sample
a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe
Resource
win7-20240903-en
General
-
Target
a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe
-
Size
96KB
-
MD5
5f183655fa1a1055d33053759abd8b05
-
SHA1
4757739dd4a1c5e24981a7742807271ecc23b7a1
-
SHA256
a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2
-
SHA512
5b1d8038890af7fc2500dd5a3ac68b10d09c5f7df687d5458c484a18592abef1ec4961106b3f5098e75359fed25f8b21d5047213cb17d75cf73d6f56ecb1a749
-
SSDEEP
1536:HnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:HGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4488 omsecor.exe 1388 omsecor.exe 1272 omsecor.exe 1392 omsecor.exe 1616 omsecor.exe 448 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3348 set thread context of 2232 3348 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 82 PID 4488 set thread context of 1388 4488 omsecor.exe 86 PID 1272 set thread context of 1392 1272 omsecor.exe 100 PID 1616 set thread context of 448 1616 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 4836 3348 WerFault.exe 81 4480 4488 WerFault.exe 84 4416 1272 WerFault.exe 99 2832 1616 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3348 wrote to memory of 2232 3348 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 82 PID 3348 wrote to memory of 2232 3348 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 82 PID 3348 wrote to memory of 2232 3348 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 82 PID 3348 wrote to memory of 2232 3348 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 82 PID 3348 wrote to memory of 2232 3348 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 82 PID 2232 wrote to memory of 4488 2232 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 84 PID 2232 wrote to memory of 4488 2232 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 84 PID 2232 wrote to memory of 4488 2232 a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe 84 PID 4488 wrote to memory of 1388 4488 omsecor.exe 86 PID 4488 wrote to memory of 1388 4488 omsecor.exe 86 PID 4488 wrote to memory of 1388 4488 omsecor.exe 86 PID 4488 wrote to memory of 1388 4488 omsecor.exe 86 PID 4488 wrote to memory of 1388 4488 omsecor.exe 86 PID 1388 wrote to memory of 1272 1388 omsecor.exe 99 PID 1388 wrote to memory of 1272 1388 omsecor.exe 99 PID 1388 wrote to memory of 1272 1388 omsecor.exe 99 PID 1272 wrote to memory of 1392 1272 omsecor.exe 100 PID 1272 wrote to memory of 1392 1272 omsecor.exe 100 PID 1272 wrote to memory of 1392 1272 omsecor.exe 100 PID 1272 wrote to memory of 1392 1272 omsecor.exe 100 PID 1272 wrote to memory of 1392 1272 omsecor.exe 100 PID 1392 wrote to memory of 1616 1392 omsecor.exe 102 PID 1392 wrote to memory of 1616 1392 omsecor.exe 102 PID 1392 wrote to memory of 1616 1392 omsecor.exe 102 PID 1616 wrote to memory of 448 1616 omsecor.exe 103 PID 1616 wrote to memory of 448 1616 omsecor.exe 103 PID 1616 wrote to memory of 448 1616 omsecor.exe 103 PID 1616 wrote to memory of 448 1616 omsecor.exe 103 PID 1616 wrote to memory of 448 1616 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe"C:\Users\Admin\AppData\Local\Temp\a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exeC:\Users\Admin\AppData\Local\Temp\a3853861e93889de282be1696e5c1f9b899c5ce93bb35cdd7c78529592c020e2.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2568⤵
- Program crash
PID:2832
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 2926⤵
- Program crash
PID:4416
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 2884⤵
- Program crash
PID:4480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3348 -s 3002⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3348 -ip 33481⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4488 -ip 44881⤵PID:2420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1272 -ip 12721⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1616 -ip 16161⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59cd3e66caaebb6f7793904750adc7087
SHA139a9b43da725213994fe59bb824cbe573f33a54a
SHA2562284f64449bdd0748e51ed5b7fc736c9b3dddedeaa45cbb058d934fa8f6a6f12
SHA512fefd853a56bcc7e5705f4dbc0fa77452df0add10f5e3a27df3bb32ab6c15a07f5917d7640c2e2bd16470082c7ac3b3b2a8a7993de8ea47c1ef44a0a90e52990c
-
Filesize
96KB
MD5466adf1141531b43662be0dd6ea9682c
SHA1785c9981010a1ccf5de5d64f6c0da40871f619cb
SHA256be2fb5874a40883f83052c9875636903fdc086b7e38e2ae6eb79ba1b37f7b134
SHA5123b9ba1ccc517bd7172179e168e35113d07aec2f75be8b9e78423c3184b1844a66f112c0faa1ee62ae164677ed96d24dc333e308aa71828950441ed6045c0b0db
-
Filesize
96KB
MD5ea70cfeb7de8fdace56f2355a88117a5
SHA167410e3c9edb1a06019b94022a9c509c20f34c11
SHA2565007383fa2ef3a59b1acce5250cbb9bebb5f4ae52fec8b0f96b01aee782d8172
SHA512f8faba252cb4a1d2ea2698a5d3edd356c654f4b0161227963d0171621a1f8017fa83d537d9d3474cca2544819e48714c3d802d51378d14deecc5d297f410f5ba