Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 21:26
Static task
static1
Behavioral task
behavioral1
Sample
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe
Resource
win7-20240903-en
General
-
Target
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe
-
Size
96KB
-
MD5
eca5251ebf7783c89f267764cd2348e7
-
SHA1
be5f03c1242410f989a716e65a131178d7836d6f
-
SHA256
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5
-
SHA512
411c9a41982fafd99dfb882da6ef3f064b7a14235b7376372b55a6ee670984a778a5fdddd8b47a6e1e1cea0e55d76c9431f39af7e4f7ee4be10da5d2c4d9cdf8
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:vGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1168 omsecor.exe 4552 omsecor.exe 1856 omsecor.exe 1580 omsecor.exe 1900 omsecor.exe 4328 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1820 set thread context of 944 1820 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 83 PID 1168 set thread context of 4552 1168 omsecor.exe 88 PID 1856 set thread context of 1580 1856 omsecor.exe 108 PID 1900 set thread context of 4328 1900 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 2012 1820 WerFault.exe 82 4720 1168 WerFault.exe 86 804 1856 WerFault.exe 107 2996 1900 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1820 wrote to memory of 944 1820 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 83 PID 1820 wrote to memory of 944 1820 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 83 PID 1820 wrote to memory of 944 1820 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 83 PID 1820 wrote to memory of 944 1820 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 83 PID 1820 wrote to memory of 944 1820 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 83 PID 944 wrote to memory of 1168 944 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 86 PID 944 wrote to memory of 1168 944 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 86 PID 944 wrote to memory of 1168 944 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 86 PID 1168 wrote to memory of 4552 1168 omsecor.exe 88 PID 1168 wrote to memory of 4552 1168 omsecor.exe 88 PID 1168 wrote to memory of 4552 1168 omsecor.exe 88 PID 1168 wrote to memory of 4552 1168 omsecor.exe 88 PID 1168 wrote to memory of 4552 1168 omsecor.exe 88 PID 4552 wrote to memory of 1856 4552 omsecor.exe 107 PID 4552 wrote to memory of 1856 4552 omsecor.exe 107 PID 4552 wrote to memory of 1856 4552 omsecor.exe 107 PID 1856 wrote to memory of 1580 1856 omsecor.exe 108 PID 1856 wrote to memory of 1580 1856 omsecor.exe 108 PID 1856 wrote to memory of 1580 1856 omsecor.exe 108 PID 1856 wrote to memory of 1580 1856 omsecor.exe 108 PID 1856 wrote to memory of 1580 1856 omsecor.exe 108 PID 1580 wrote to memory of 1900 1580 omsecor.exe 110 PID 1580 wrote to memory of 1900 1580 omsecor.exe 110 PID 1580 wrote to memory of 1900 1580 omsecor.exe 110 PID 1900 wrote to memory of 4328 1900 omsecor.exe 111 PID 1900 wrote to memory of 4328 1900 omsecor.exe 111 PID 1900 wrote to memory of 4328 1900 omsecor.exe 111 PID 1900 wrote to memory of 4328 1900 omsecor.exe 111 PID 1900 wrote to memory of 4328 1900 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe"C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exeC:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 2688⤵
- Program crash
PID:2996
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 2926⤵
- Program crash
PID:804
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 2884⤵
- Program crash
PID:4720
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 2882⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1820 -ip 18201⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1168 -ip 11681⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1856 -ip 18561⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1900 -ip 19001⤵PID:3064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5131e6494b62fecf972cac789a2ad6fda
SHA16cacb70794c2a2914468386a5baf369e890c80eb
SHA256c1f374fae627470d91103eb8c9edc8ab399a0f2b25398c6cb9cde2b1b3179e5a
SHA512c74b2780cf80f4c5205df7fc883c712bf0fb99198ed7b0526b362724d8c6937140f782692d08a9cebcfc10a1ef8f8a531420b9a6ddab0b89e912d113de396b0e
-
Filesize
96KB
MD51015be96f4af5ab58e93cd7fb267df9a
SHA116a31d380f38d6f49e81bad1b11d1b14f4148420
SHA25692118f4c3b9c7e3b0e22b5575441e8db8ddcc2b65f198437eed20044cd050888
SHA5127bbfcf422befb3c5450c46c0534154166d9c2e29bc6a023327aacf6c8ef9daf9e2bf686c29c96eb0c66015da4809a9627b64deb591cc82f1716621f37665a286
-
Filesize
96KB
MD5e9f8f8d2d47c79c120f998f45b931a5a
SHA1384894542813a3bc5611acc7cb67168cb2425373
SHA256d8041e2fa200985b6d0d7e11c3a126845d907be7db7905eb4ed7f70a2a5be3e9
SHA51238f5091d9db86118ef1afdfb47314cda5295b95a01a53b0a56115dcc008c3f05e062d9e00be5c0054e2eec8ab8d137e82ea6b69e7a574fba72c29cb79d7f7de2