Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 03:39
Static task
static1
Behavioral task
behavioral1
Sample
c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe
Resource
win7-20240903-en
General
-
Target
c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe
-
Size
96KB
-
MD5
4d7565fd278b35592d7e4be90523b770
-
SHA1
fd9c3504f56ee5596f7249bed151ca87823f1b46
-
SHA256
c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972
-
SHA512
22f87d8fe9ed341165baf6a37f18163f9a9be06af7e491b269ef3ebe2a192c764ce5c992c4270e8b82878b68a062073f5c239836231adadb12c28db0218af15b
-
SSDEEP
1536:onAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:oGs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2112 omsecor.exe 4388 omsecor.exe 812 omsecor.exe 372 omsecor.exe 3460 omsecor.exe 1680 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2816 set thread context of 4372 2816 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 83 PID 2112 set thread context of 4388 2112 omsecor.exe 88 PID 812 set thread context of 372 812 omsecor.exe 108 PID 3460 set thread context of 1680 3460 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 212 2816 WerFault.exe 82 1040 2112 WerFault.exe 86 1464 812 WerFault.exe 107 4512 3460 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4372 2816 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 83 PID 2816 wrote to memory of 4372 2816 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 83 PID 2816 wrote to memory of 4372 2816 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 83 PID 2816 wrote to memory of 4372 2816 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 83 PID 2816 wrote to memory of 4372 2816 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 83 PID 4372 wrote to memory of 2112 4372 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 86 PID 4372 wrote to memory of 2112 4372 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 86 PID 4372 wrote to memory of 2112 4372 c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe 86 PID 2112 wrote to memory of 4388 2112 omsecor.exe 88 PID 2112 wrote to memory of 4388 2112 omsecor.exe 88 PID 2112 wrote to memory of 4388 2112 omsecor.exe 88 PID 2112 wrote to memory of 4388 2112 omsecor.exe 88 PID 2112 wrote to memory of 4388 2112 omsecor.exe 88 PID 4388 wrote to memory of 812 4388 omsecor.exe 107 PID 4388 wrote to memory of 812 4388 omsecor.exe 107 PID 4388 wrote to memory of 812 4388 omsecor.exe 107 PID 812 wrote to memory of 372 812 omsecor.exe 108 PID 812 wrote to memory of 372 812 omsecor.exe 108 PID 812 wrote to memory of 372 812 omsecor.exe 108 PID 812 wrote to memory of 372 812 omsecor.exe 108 PID 812 wrote to memory of 372 812 omsecor.exe 108 PID 372 wrote to memory of 3460 372 omsecor.exe 110 PID 372 wrote to memory of 3460 372 omsecor.exe 110 PID 372 wrote to memory of 3460 372 omsecor.exe 110 PID 3460 wrote to memory of 1680 3460 omsecor.exe 112 PID 3460 wrote to memory of 1680 3460 omsecor.exe 112 PID 3460 wrote to memory of 1680 3460 omsecor.exe 112 PID 3460 wrote to memory of 1680 3460 omsecor.exe 112 PID 3460 wrote to memory of 1680 3460 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe"C:\Users\Admin\AppData\Local\Temp\c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exeC:\Users\Admin\AppData\Local\Temp\c51daafbafe4a8521bf2cb7fbf4550ff2c7ba0227b37ffca1741e8617c5da972N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 2568⤵
- Program crash
PID:4512
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 2926⤵
- Program crash
PID:1464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 3004⤵
- Program crash
PID:1040
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2882⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2816 -ip 28161⤵PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2112 -ip 21121⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 812 -ip 8121⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3460 -ip 34601⤵PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5825a2988c423dfbd3480015e32dd4a0a
SHA1f1f0db61e746e0804b457e8791b059307f2f3f0d
SHA25651332b52811ac532684c38bdf634c37dfa5dd3602fea928b13d8943de598f293
SHA51206bfb70b9bccfdb88552b8eefcef236f8af78c54dc4507a78e4daf715a00ac99a117280d16cdeb1cd58e9b86ee438c4f484a20235922824a87dda35d3e1207ea
-
Filesize
96KB
MD5ef73bc5e3724450dba2b1d7fc513089f
SHA1968d4d257e6f46cd69969592410f1a1c6ba6cfbe
SHA256a44ecf5df3e463ca53d5904c98474aae9930edf8506d6ab722e74697463e1454
SHA5125a32cf142a31d648b572079829fa72edc9aee977d08f13ed1517684b11f78e9fbc1def12883c13a4aa66392e6e43f008007d0c5d01dac75b780b88eff9f5ddf5
-
Filesize
96KB
MD5c43224a3fbc2b02f2f67d874306c2fd6
SHA18e8ed360958ac0b37390d1b1be27043d026049fc
SHA25687814d7692a9ed59a24986819216d997f0771c8ae987202c134de50449674ef3
SHA5124d425d8d10a136c927342f7e74240834575bda32b09b7454085a6ed2023cb17708c21c0209e8c8872c119e9c467e642c109938f87a28a3693426de31f7f6d2a8