Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 17:51
Static task
static1
Behavioral task
behavioral1
Sample
a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe
Resource
win7-20240729-en
General
-
Target
a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe
-
Size
96KB
-
MD5
0b392359a652f185cb5d802d17b32e7a
-
SHA1
4ccf8207bd88f50b6e8ffb1e6d75c6be19b8776a
-
SHA256
a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c
-
SHA512
65ea75b38bbd8c50da1dda641fb13c83dea793ff5171d729fbf39850a761b24f0b9088bbac6fc0e7dfc83c60ddb514d3b521347371c5542e5936fb652b230391
-
SSDEEP
1536:snAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:sGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4008 omsecor.exe 3920 omsecor.exe 1628 omsecor.exe 2312 omsecor.exe 4672 omsecor.exe 2568 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2512 set thread context of 4580 2512 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 83 PID 4008 set thread context of 3920 4008 omsecor.exe 87 PID 1628 set thread context of 2312 1628 omsecor.exe 107 PID 4672 set thread context of 2568 4672 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 2392 2512 WerFault.exe 82 2976 4008 WerFault.exe 86 3192 1628 WerFault.exe 106 1500 4672 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4580 2512 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 83 PID 2512 wrote to memory of 4580 2512 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 83 PID 2512 wrote to memory of 4580 2512 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 83 PID 2512 wrote to memory of 4580 2512 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 83 PID 2512 wrote to memory of 4580 2512 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 83 PID 4580 wrote to memory of 4008 4580 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 86 PID 4580 wrote to memory of 4008 4580 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 86 PID 4580 wrote to memory of 4008 4580 a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe 86 PID 4008 wrote to memory of 3920 4008 omsecor.exe 87 PID 4008 wrote to memory of 3920 4008 omsecor.exe 87 PID 4008 wrote to memory of 3920 4008 omsecor.exe 87 PID 4008 wrote to memory of 3920 4008 omsecor.exe 87 PID 4008 wrote to memory of 3920 4008 omsecor.exe 87 PID 3920 wrote to memory of 1628 3920 omsecor.exe 106 PID 3920 wrote to memory of 1628 3920 omsecor.exe 106 PID 3920 wrote to memory of 1628 3920 omsecor.exe 106 PID 1628 wrote to memory of 2312 1628 omsecor.exe 107 PID 1628 wrote to memory of 2312 1628 omsecor.exe 107 PID 1628 wrote to memory of 2312 1628 omsecor.exe 107 PID 1628 wrote to memory of 2312 1628 omsecor.exe 107 PID 1628 wrote to memory of 2312 1628 omsecor.exe 107 PID 2312 wrote to memory of 4672 2312 omsecor.exe 109 PID 2312 wrote to memory of 4672 2312 omsecor.exe 109 PID 2312 wrote to memory of 4672 2312 omsecor.exe 109 PID 4672 wrote to memory of 2568 4672 omsecor.exe 111 PID 4672 wrote to memory of 2568 4672 omsecor.exe 111 PID 4672 wrote to memory of 2568 4672 omsecor.exe 111 PID 4672 wrote to memory of 2568 4672 omsecor.exe 111 PID 4672 wrote to memory of 2568 4672 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe"C:\Users\Admin\AppData\Local\Temp\a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exeC:\Users\Admin\AppData\Local\Temp\a92d2b4027e0323bcebcc796716b231af77696dbea61eb09e234a3632ad7a97c.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 2568⤵
- Program crash
PID:1500
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 3046⤵
- Program crash
PID:3192
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 2884⤵
- Program crash
PID:2976
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 3002⤵
- Program crash
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2512 -ip 25121⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4008 -ip 40081⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1628 -ip 16281⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4672 -ip 46721⤵PID:844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d7850b3754c8e6b7895617b99702cc2a
SHA13f53b3c052fce86dc3d030b00d78955cd8f49cbb
SHA256d4e7cd8be720b5bf8e1e2d643829951fbb5b03f66ac683a1f3a15f031f3066d2
SHA512178fc151c81429bba91402e03a9161b299f7c962806dab0e35422252f95f22d5dc6b2936fd814474ff607e32dc14652b021817a7b6f3991ed931feafcd61c651
-
Filesize
96KB
MD5e9e683900ee96f066e46cfaa5d508275
SHA196ad9dc12b1983a0f7dc34db88e48f4ca3a5fe29
SHA25689ba4184363a03e939f88438801f6e8edeee8a864c48a0fb512132f935389cc3
SHA512df6cade8f6bf7d4edb9d25f2893f99e59ad9c7ba36c7f9966f314577e4a3b9ea2d61b8062fbb2b7383f533263c976922ceb8d7fbea76d66c0a75a5bfd8ada9dc
-
Filesize
96KB
MD55db5d19b009cbed3d63ff91e107185b3
SHA1c352aa8437a78eaaf8e864e490b48861e6bd0f17
SHA2561431b82bf515bbc9cbf5ec5d4482763bb7294836b5bb84450a0c6cf62213139e
SHA5126800b62efcce028719e244f196ed01f29f79d15015c804e6e1039720d906656452f0dfaade6ab86f26713617ddcc7bfa84707e367a6d2692e964da4afd3bd283