Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 21:29
Static task
static1
Behavioral task
behavioral1
Sample
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe
Resource
win7-20240729-en
General
-
Target
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe
-
Size
96KB
-
MD5
eca5251ebf7783c89f267764cd2348e7
-
SHA1
be5f03c1242410f989a716e65a131178d7836d6f
-
SHA256
c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5
-
SHA512
411c9a41982fafd99dfb882da6ef3f064b7a14235b7376372b55a6ee670984a778a5fdddd8b47a6e1e1cea0e55d76c9431f39af7e4f7ee4be10da5d2c4d9cdf8
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:vGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4876 omsecor.exe 2608 omsecor.exe 3548 omsecor.exe 1796 omsecor.exe 3896 omsecor.exe 4800 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1088 set thread context of 4928 1088 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 82 PID 4876 set thread context of 2608 4876 omsecor.exe 86 PID 3548 set thread context of 1796 3548 omsecor.exe 100 PID 3896 set thread context of 4800 3896 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4544 1088 WerFault.exe 81 2760 4876 WerFault.exe 84 2620 3548 WerFault.exe 99 4144 3896 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1088 wrote to memory of 4928 1088 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 82 PID 1088 wrote to memory of 4928 1088 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 82 PID 1088 wrote to memory of 4928 1088 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 82 PID 1088 wrote to memory of 4928 1088 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 82 PID 1088 wrote to memory of 4928 1088 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 82 PID 4928 wrote to memory of 4876 4928 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 84 PID 4928 wrote to memory of 4876 4928 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 84 PID 4928 wrote to memory of 4876 4928 c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe 84 PID 4876 wrote to memory of 2608 4876 omsecor.exe 86 PID 4876 wrote to memory of 2608 4876 omsecor.exe 86 PID 4876 wrote to memory of 2608 4876 omsecor.exe 86 PID 4876 wrote to memory of 2608 4876 omsecor.exe 86 PID 4876 wrote to memory of 2608 4876 omsecor.exe 86 PID 2608 wrote to memory of 3548 2608 omsecor.exe 99 PID 2608 wrote to memory of 3548 2608 omsecor.exe 99 PID 2608 wrote to memory of 3548 2608 omsecor.exe 99 PID 3548 wrote to memory of 1796 3548 omsecor.exe 100 PID 3548 wrote to memory of 1796 3548 omsecor.exe 100 PID 3548 wrote to memory of 1796 3548 omsecor.exe 100 PID 3548 wrote to memory of 1796 3548 omsecor.exe 100 PID 3548 wrote to memory of 1796 3548 omsecor.exe 100 PID 1796 wrote to memory of 3896 1796 omsecor.exe 102 PID 1796 wrote to memory of 3896 1796 omsecor.exe 102 PID 1796 wrote to memory of 3896 1796 omsecor.exe 102 PID 3896 wrote to memory of 4800 3896 omsecor.exe 104 PID 3896 wrote to memory of 4800 3896 omsecor.exe 104 PID 3896 wrote to memory of 4800 3896 omsecor.exe 104 PID 3896 wrote to memory of 4800 3896 omsecor.exe 104 PID 3896 wrote to memory of 4800 3896 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe"C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exeC:\Users\Admin\AppData\Local\Temp\c1ccec61ba6fcfb152db09a0ed86a9d33e7b0e290427b99375f4d1307b909cd5.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 2688⤵
- Program crash
PID:4144
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 2926⤵
- Program crash
PID:2620
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 3004⤵
- Program crash
PID:2760
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 2882⤵
- Program crash
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1088 -ip 10881⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4876 -ip 48761⤵PID:968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3548 -ip 35481⤵PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3896 -ip 38961⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD563a8f52723a459749323bc52ed57ee5e
SHA157b2685d3105afbc99bbf18f967940c4f43a6e75
SHA2568dcfb5d861bea14157b1aef50a2269d20486ad3d5561421674f0b2ad1f86c069
SHA51298a9ec6af1ee2f86b0790c2f663eb754c7160aa20d86ac0247ea51333fe047a9dc64fa48caa6b07e534a5113881a55006423e8b4f32ea45c38a64cc918887e6b
-
Filesize
96KB
MD51015be96f4af5ab58e93cd7fb267df9a
SHA116a31d380f38d6f49e81bad1b11d1b14f4148420
SHA25692118f4c3b9c7e3b0e22b5575441e8db8ddcc2b65f198437eed20044cd050888
SHA5127bbfcf422befb3c5450c46c0534154166d9c2e29bc6a023327aacf6c8ef9daf9e2bf686c29c96eb0c66015da4809a9627b64deb591cc82f1716621f37665a286
-
Filesize
96KB
MD53464909e47bb85c3eb0f60a06ae778f5
SHA1028b0e6145760344b299918154d8ad93e4a9fb64
SHA25686148a1101d1cf975649de3a3d770812497ad639f2936c35c60fe5258f711f28
SHA51207c0166c38dd450c071ee149a36d817ae8db41eb11ddc7c7721ec63bcb9137e350562ed99e15a6934c4ecd7dff91d20a95b56ca6ba95efbd2418e648f498534a