Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 16:59
Static task
static1
Behavioral task
behavioral1
Sample
fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe
Resource
win7-20240903-en
General
-
Target
fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe
-
Size
96KB
-
MD5
0a68231149af2d2de2fc3a35fb3bbc40
-
SHA1
5ffd534ec88af748dc1f5175113b0f211d40f3af
-
SHA256
fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5
-
SHA512
86a5cfe53a1735e109c5fac98727be340fa5e89f070e25ebf54ff9fd2fd5fc568f3e9a831c986e26c5b435cc5319e3c1de28d3cfa29e239a29c76ad9f48e4942
-
SSDEEP
1536:5nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxu:5Gs8cd8eXlYairZYqMddH13u
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4424 omsecor.exe 444 omsecor.exe 3032 omsecor.exe 3932 omsecor.exe 1552 omsecor.exe 1800 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2472 set thread context of 2272 2472 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 82 PID 4424 set thread context of 444 4424 omsecor.exe 86 PID 3032 set thread context of 3932 3032 omsecor.exe 107 PID 1552 set thread context of 1800 1552 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 3132 2472 WerFault.exe 81 856 4424 WerFault.exe 84 2208 3032 WerFault.exe 106 4400 1552 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2272 2472 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 82 PID 2472 wrote to memory of 2272 2472 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 82 PID 2472 wrote to memory of 2272 2472 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 82 PID 2472 wrote to memory of 2272 2472 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 82 PID 2472 wrote to memory of 2272 2472 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 82 PID 2272 wrote to memory of 4424 2272 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 84 PID 2272 wrote to memory of 4424 2272 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 84 PID 2272 wrote to memory of 4424 2272 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 84 PID 4424 wrote to memory of 444 4424 omsecor.exe 86 PID 4424 wrote to memory of 444 4424 omsecor.exe 86 PID 4424 wrote to memory of 444 4424 omsecor.exe 86 PID 4424 wrote to memory of 444 4424 omsecor.exe 86 PID 4424 wrote to memory of 444 4424 omsecor.exe 86 PID 444 wrote to memory of 3032 444 omsecor.exe 106 PID 444 wrote to memory of 3032 444 omsecor.exe 106 PID 444 wrote to memory of 3032 444 omsecor.exe 106 PID 3032 wrote to memory of 3932 3032 omsecor.exe 107 PID 3032 wrote to memory of 3932 3032 omsecor.exe 107 PID 3032 wrote to memory of 3932 3032 omsecor.exe 107 PID 3032 wrote to memory of 3932 3032 omsecor.exe 107 PID 3032 wrote to memory of 3932 3032 omsecor.exe 107 PID 3932 wrote to memory of 1552 3932 omsecor.exe 109 PID 3932 wrote to memory of 1552 3932 omsecor.exe 109 PID 3932 wrote to memory of 1552 3932 omsecor.exe 109 PID 1552 wrote to memory of 1800 1552 omsecor.exe 111 PID 1552 wrote to memory of 1800 1552 omsecor.exe 111 PID 1552 wrote to memory of 1800 1552 omsecor.exe 111 PID 1552 wrote to memory of 1800 1552 omsecor.exe 111 PID 1552 wrote to memory of 1800 1552 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe"C:\Users\Admin\AppData\Local\Temp\fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exeC:\Users\Admin\AppData\Local\Temp\fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 2568⤵
- Program crash
PID:4400
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 2926⤵
- Program crash
PID:2208
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 3004⤵
- Program crash
PID:856
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 3002⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2472 -ip 24721⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4424 -ip 44241⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3032 -ip 30321⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1552 -ip 15521⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a364d0319570c2bee59151854c2c7212
SHA18371bcb32ddbe9f11f897e0e1b60fb7e9e607818
SHA2569e4012a17312856eca17912927e95dada2fe6783e316e1e41d5732fe7b00e1e1
SHA512f172da566cde68c6d30d7ec57ef14fce0c091506c194701c1aa506d988196df04758ad75c6d2a0115cc0619505029d720eccd9be55ff29b7ede1d1ea19349830
-
Filesize
96KB
MD535afb09fb08b8c414c83808134204785
SHA1196effd894da34734b0980cfae0a132c556238ab
SHA256ade37df719267c53f9573a4fb1325e35cfae7c859560254f5020b64f33343525
SHA51203201954f03bf2f464e320acb77cb14bd2e73a31d5724493d621e6b989102d0d0aa0d7022bf5b156b3cd1e20cc807439259b1242de3ad1feb311ab86cac03d3a
-
Filesize
96KB
MD55fae32e8059f34830f867c46debe3eab
SHA1426f2670f91775bd09568239c64894393224f98c
SHA25655ec9adb472797746772a60c51c2c7ae8acd5b79dd53771e8185e1e7609e6412
SHA51294cb963451d8f8488381d25bff5cc80738fe13fb038c66361133ac1e81f3c07069d4b4f134751ee9d4c175948cb80564789a21a8171b5a611861c5953608d6cc