Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 11:01
Static task
static1
Behavioral task
behavioral1
Sample
17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe
Resource
win7-20240903-en
General
-
Target
17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe
-
Size
96KB
-
MD5
aa01c104f051dd346f3d7fb5d1963440
-
SHA1
1b8917f9c48e9efe31e6d3015d4a638d1372a5c0
-
SHA256
17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9a
-
SHA512
25d78535126338be97934e2425b163c7ca15d9218d03bb1f267fade9e0693ef4074c98413da28499840ca82173cae3f38687a6a626e56f6dd21f12a07b1f417d
-
SSDEEP
1536:pnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:pGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3884 omsecor.exe 5112 omsecor.exe 4044 omsecor.exe 2520 omsecor.exe 2128 omsecor.exe 4944 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 116 set thread context of 4820 116 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 83 PID 3884 set thread context of 5112 3884 omsecor.exe 87 PID 4044 set thread context of 2520 4044 omsecor.exe 109 PID 2128 set thread context of 4944 2128 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3652 116 WerFault.exe 82 3548 3884 WerFault.exe 86 3560 4044 WerFault.exe 108 3712 2128 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 116 wrote to memory of 4820 116 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 83 PID 116 wrote to memory of 4820 116 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 83 PID 116 wrote to memory of 4820 116 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 83 PID 116 wrote to memory of 4820 116 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 83 PID 116 wrote to memory of 4820 116 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 83 PID 4820 wrote to memory of 3884 4820 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 86 PID 4820 wrote to memory of 3884 4820 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 86 PID 4820 wrote to memory of 3884 4820 17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe 86 PID 3884 wrote to memory of 5112 3884 omsecor.exe 87 PID 3884 wrote to memory of 5112 3884 omsecor.exe 87 PID 3884 wrote to memory of 5112 3884 omsecor.exe 87 PID 3884 wrote to memory of 5112 3884 omsecor.exe 87 PID 3884 wrote to memory of 5112 3884 omsecor.exe 87 PID 5112 wrote to memory of 4044 5112 omsecor.exe 108 PID 5112 wrote to memory of 4044 5112 omsecor.exe 108 PID 5112 wrote to memory of 4044 5112 omsecor.exe 108 PID 4044 wrote to memory of 2520 4044 omsecor.exe 109 PID 4044 wrote to memory of 2520 4044 omsecor.exe 109 PID 4044 wrote to memory of 2520 4044 omsecor.exe 109 PID 4044 wrote to memory of 2520 4044 omsecor.exe 109 PID 4044 wrote to memory of 2520 4044 omsecor.exe 109 PID 2520 wrote to memory of 2128 2520 omsecor.exe 111 PID 2520 wrote to memory of 2128 2520 omsecor.exe 111 PID 2520 wrote to memory of 2128 2520 omsecor.exe 111 PID 2128 wrote to memory of 4944 2128 omsecor.exe 113 PID 2128 wrote to memory of 4944 2128 omsecor.exe 113 PID 2128 wrote to memory of 4944 2128 omsecor.exe 113 PID 2128 wrote to memory of 4944 2128 omsecor.exe 113 PID 2128 wrote to memory of 4944 2128 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe"C:\Users\Admin\AppData\Local\Temp\17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exeC:\Users\Admin\AppData\Local\Temp\17f6caf955733500fa5eb7efeea47612ac0843c40807a93eda268aaa128ebd9aN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 2568⤵
- Program crash
PID:3712
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 2926⤵
- Program crash
PID:3560
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 2884⤵
- Program crash
PID:3548
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 2882⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 116 -ip 1161⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3884 -ip 38841⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4044 -ip 40441⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2128 -ip 21281⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD539bb9ee4a5de2bf07aeada4e26f0ecc5
SHA1e30d51ec2e22ca3e90abe58a1319e5fa48f23f88
SHA2566334f19c598668c0757bcf234114fb80537fe7ed41330db29ae658192227401e
SHA512cf2a7ebd31e8c649252a5445ebc18b8ccadfa37ccc70f6de6ca1a125889ada9db56b7da49fa65bb89a3031679e3369013b20eea1f080c45b1815c7c48eef6551
-
Filesize
96KB
MD59e6e69f3a0542fc8c1dc0f8b0957d432
SHA1f4896ba80880b39453bb0a8d10fb8de4fcf7040d
SHA2565b59b9a3c20b96b825d27073408fb1ab8b5db90f697e1d79d572a95d42756c08
SHA51258b1218b85849e138389bfdee64a0f2d7b4d8b9bd3c6e64703462cee0125ede11378b3893bb298c4ea4fbc5b736f98f7cf44c13de43587cde550c5c20729b293
-
Filesize
96KB
MD5ef67a06a1295136d79e3269c05757268
SHA17348f6c6786faa4d472a20908c766219f943af68
SHA256caf4b706e537b5028f099d15669bcedc7459c7e999dd62781d97e5a1ad270006
SHA5122ba8b735404d50873411f03950ced04ddbc0f32a9606b81e5bed36f7af24cbbd99b2168d54a069e34f3faf738e3bb0639fa8fd1336d5d6482cefbecf2fc31642