Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 13:23
Static task
static1
Behavioral task
behavioral1
Sample
facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe
Resource
win7-20241010-en
General
-
Target
facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe
-
Size
96KB
-
MD5
2b3bf1308b7e79ef933b3d2592048f90
-
SHA1
387d9d6b78e9aa6fef3ddc5d08962a0c6711526c
-
SHA256
facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a
-
SHA512
3f86081d595862dd03a97f01ee65d25a5ab22f402edf98257060d398632efabdcbc0ad378b149d5dfd71fc98b70f4f43fd2faafafa6e5f4810722ac31b2ff25b
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:vGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2504 omsecor.exe 3964 omsecor.exe 1504 omsecor.exe 1212 omsecor.exe 3652 omsecor.exe 4692 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3644 set thread context of 5036 3644 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 82 PID 2504 set thread context of 3964 2504 omsecor.exe 86 PID 1504 set thread context of 1212 1504 omsecor.exe 100 PID 3652 set thread context of 4692 3652 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4904 3644 WerFault.exe 81 2520 2504 WerFault.exe 85 1856 1504 WerFault.exe 99 4348 3652 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3644 wrote to memory of 5036 3644 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 82 PID 3644 wrote to memory of 5036 3644 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 82 PID 3644 wrote to memory of 5036 3644 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 82 PID 3644 wrote to memory of 5036 3644 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 82 PID 3644 wrote to memory of 5036 3644 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 82 PID 5036 wrote to memory of 2504 5036 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 85 PID 5036 wrote to memory of 2504 5036 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 85 PID 5036 wrote to memory of 2504 5036 facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe 85 PID 2504 wrote to memory of 3964 2504 omsecor.exe 86 PID 2504 wrote to memory of 3964 2504 omsecor.exe 86 PID 2504 wrote to memory of 3964 2504 omsecor.exe 86 PID 2504 wrote to memory of 3964 2504 omsecor.exe 86 PID 2504 wrote to memory of 3964 2504 omsecor.exe 86 PID 3964 wrote to memory of 1504 3964 omsecor.exe 99 PID 3964 wrote to memory of 1504 3964 omsecor.exe 99 PID 3964 wrote to memory of 1504 3964 omsecor.exe 99 PID 1504 wrote to memory of 1212 1504 omsecor.exe 100 PID 1504 wrote to memory of 1212 1504 omsecor.exe 100 PID 1504 wrote to memory of 1212 1504 omsecor.exe 100 PID 1504 wrote to memory of 1212 1504 omsecor.exe 100 PID 1504 wrote to memory of 1212 1504 omsecor.exe 100 PID 1212 wrote to memory of 3652 1212 omsecor.exe 102 PID 1212 wrote to memory of 3652 1212 omsecor.exe 102 PID 1212 wrote to memory of 3652 1212 omsecor.exe 102 PID 3652 wrote to memory of 4692 3652 omsecor.exe 104 PID 3652 wrote to memory of 4692 3652 omsecor.exe 104 PID 3652 wrote to memory of 4692 3652 omsecor.exe 104 PID 3652 wrote to memory of 4692 3652 omsecor.exe 104 PID 3652 wrote to memory of 4692 3652 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe"C:\Users\Admin\AppData\Local\Temp\facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exeC:\Users\Admin\AppData\Local\Temp\facc8a9019a58871c175f23c94e592ee55f7fec7b154e4eab8602a35d67f9d5a.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 2568⤵
- Program crash
PID:4348
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 2926⤵
- Program crash
PID:1856
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2884⤵
- Program crash
PID:2520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 2882⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3644 -ip 36441⤵PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2504 -ip 25041⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1504 -ip 15041⤵PID:668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3652 -ip 36521⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD51c190a9308343d4e06ddb69d23e3eaa2
SHA1f1dbf1b9bc052678ec282215034f37e54a4e6c0e
SHA256a76d66d79700dd1bad84fad4eb4380a920e4e5136aae0e460d2625d3f259a706
SHA51228b50f7d02701e202bc3f015c4733e540fac221b27317622094b7458fd31a53e136be776e2d251a2bddc9a369e020934c9df509155cab68948cb75852abc3d54
-
Filesize
96KB
MD56a0342ba163266476918130d5dfe9e1f
SHA158b19a5704b00b3d5cbc5113a0083846b36fcc4b
SHA2563fbf780d19ac640c41676638bbef3b8ccae7c2412bf6f62ec0b1f5d4706f2736
SHA51249e35a848141535a1668821b92318d222c80abeb77df49e2a26032405a417c691a759d24fa77c9775f9ede8a3fa6f11f1c73f633a52c2556a4696c66a1a2e2bb
-
Filesize
96KB
MD54b18e1feb0912960e022eb13bb47c9aa
SHA1cbdec56ec532d80403543d66eb359c083fba4277
SHA2566b0ffa7f71af6cf74f26f193dab662369bf91ee68f0e13710c0c3b6b0fb97c46
SHA512ff727578a1cb07d827ebc6ce4128abdb5db5943b734d3c1f8f1b9f53a49115ea3aa61556f8b0f95cd1bebf1d942aef5c45305bac6f239059994a3b3721b1457b