Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 08:04
Static task
static1
Behavioral task
behavioral1
Sample
adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe
Resource
win7-20241010-en
General
-
Target
adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe
-
Size
96KB
-
MD5
e347ccf3742fa70307a7a15f108b0494
-
SHA1
ca8b2f143293076f00a32caf1fa0694e3808c557
-
SHA256
adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968
-
SHA512
cf4a22c0c945d6bc98df0f1b7e89fe8d307c365a8451d78e377bb6e1965c87004af5d491e6189701569ab3323ee5629fb2c50df105ecb4700d264dcd30179d3b
-
SSDEEP
1536:LnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:LGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2944 omsecor.exe 1724 omsecor.exe 1324 omsecor.exe 244 omsecor.exe 3100 omsecor.exe 2004 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4232 set thread context of 1260 4232 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 83 PID 2944 set thread context of 1724 2944 omsecor.exe 87 PID 1324 set thread context of 244 1324 omsecor.exe 107 PID 3100 set thread context of 2004 3100 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 3200 4232 WerFault.exe 82 3064 2944 WerFault.exe 85 1556 1324 WerFault.exe 106 3604 3100 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4232 wrote to memory of 1260 4232 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 83 PID 4232 wrote to memory of 1260 4232 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 83 PID 4232 wrote to memory of 1260 4232 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 83 PID 4232 wrote to memory of 1260 4232 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 83 PID 4232 wrote to memory of 1260 4232 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 83 PID 1260 wrote to memory of 2944 1260 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 85 PID 1260 wrote to memory of 2944 1260 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 85 PID 1260 wrote to memory of 2944 1260 adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe 85 PID 2944 wrote to memory of 1724 2944 omsecor.exe 87 PID 2944 wrote to memory of 1724 2944 omsecor.exe 87 PID 2944 wrote to memory of 1724 2944 omsecor.exe 87 PID 2944 wrote to memory of 1724 2944 omsecor.exe 87 PID 2944 wrote to memory of 1724 2944 omsecor.exe 87 PID 1724 wrote to memory of 1324 1724 omsecor.exe 106 PID 1724 wrote to memory of 1324 1724 omsecor.exe 106 PID 1724 wrote to memory of 1324 1724 omsecor.exe 106 PID 1324 wrote to memory of 244 1324 omsecor.exe 107 PID 1324 wrote to memory of 244 1324 omsecor.exe 107 PID 1324 wrote to memory of 244 1324 omsecor.exe 107 PID 1324 wrote to memory of 244 1324 omsecor.exe 107 PID 1324 wrote to memory of 244 1324 omsecor.exe 107 PID 244 wrote to memory of 3100 244 omsecor.exe 109 PID 244 wrote to memory of 3100 244 omsecor.exe 109 PID 244 wrote to memory of 3100 244 omsecor.exe 109 PID 3100 wrote to memory of 2004 3100 omsecor.exe 111 PID 3100 wrote to memory of 2004 3100 omsecor.exe 111 PID 3100 wrote to memory of 2004 3100 omsecor.exe 111 PID 3100 wrote to memory of 2004 3100 omsecor.exe 111 PID 3100 wrote to memory of 2004 3100 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe"C:\Users\Admin\AppData\Local\Temp\adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exeC:\Users\Admin\AppData\Local\Temp\adc21cd6b86a38e3d9b1f123117ef22639641b375da55a99a1a6adacc786a968.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 2568⤵
- Program crash
PID:3604
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 3046⤵
- Program crash
PID:1556
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 2884⤵
- Program crash
PID:3064
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 3002⤵
- Program crash
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4232 -ip 42321⤵PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2944 -ip 29441⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1324 -ip 13241⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3100 -ip 31001⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5def52744dd7a85ee4c6789f1a732ebb5
SHA1db16e8973c5ed30d8b1b85186ed56585e263b232
SHA25626208eb72e60d117abf746c2bf613a07d4ca691f3d2abc05f773792720535435
SHA5126a2c7aa38c485b01b9ffe6583f4c522a52c27353d00a2470a7cded345efc8f93a2596e369bd63045fb2f028829db8800f1912f4589b630932a316a64612682e4
-
Filesize
96KB
MD574a459d3f3fa78060a3de38d80f112be
SHA17961690a08ba20d803304a2f54a66b113761e644
SHA256d3828b5a762b97ae600b50396a3f5d6ac477ddfa79fcaea323223c12de546fae
SHA5126507b642b2f61291f026254705791a840458278ef2565f53cf8cef0f5bff0f2b206bb527e42317ad406f12a8c9dcb6f92d46675feaf1a7118e7d0cfd532d076c
-
Filesize
96KB
MD5db480c85fb1b72df915fcb7e6be09c96
SHA11aeb640691823670ff1b547ddba7d470face33c3
SHA2566c499c5e321529a66c676f8b6874bc749fb07ec5e32e1d38b29092f46e0d8e7f
SHA5128ed9a23b3b415fb6ef274cd1ab0cae74e3ddeb03ab2faffe601c117921c81dfb7d4eca3dace5995106de71e18b3b64365c5218c131ee65a1864ae7c1ed9cdab8