Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 23:11
Static task
static1
Behavioral task
behavioral1
Sample
4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe
Resource
win7-20240903-en
General
-
Target
4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe
-
Size
96KB
-
MD5
2d7e939287535612dbb41a733fcfc732
-
SHA1
bc8ad3ba3f34ff2f083faa7e5cff2c9980b39715
-
SHA256
4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa
-
SHA512
46d9912255c2a67aa75eecbae9c5cf05980ecc69f61c386bb89789b5fe750fcf03f6c646b92fce60aefce4dc09c326c6ebd72809c8b71896099a991182f7912b
-
SSDEEP
1536:qnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:qGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1476 omsecor.exe 1344 omsecor.exe 2012 omsecor.exe 1528 omsecor.exe 1336 omsecor.exe 4680 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4648 set thread context of 3572 4648 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 82 PID 1476 set thread context of 1344 1476 omsecor.exe 87 PID 2012 set thread context of 1528 2012 omsecor.exe 100 PID 1336 set thread context of 4680 1336 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 1788 4648 WerFault.exe 81 2776 1476 WerFault.exe 85 3052 2012 WerFault.exe 99 1508 1336 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4648 wrote to memory of 3572 4648 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 82 PID 4648 wrote to memory of 3572 4648 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 82 PID 4648 wrote to memory of 3572 4648 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 82 PID 4648 wrote to memory of 3572 4648 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 82 PID 4648 wrote to memory of 3572 4648 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 82 PID 3572 wrote to memory of 1476 3572 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 85 PID 3572 wrote to memory of 1476 3572 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 85 PID 3572 wrote to memory of 1476 3572 4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe 85 PID 1476 wrote to memory of 1344 1476 omsecor.exe 87 PID 1476 wrote to memory of 1344 1476 omsecor.exe 87 PID 1476 wrote to memory of 1344 1476 omsecor.exe 87 PID 1476 wrote to memory of 1344 1476 omsecor.exe 87 PID 1476 wrote to memory of 1344 1476 omsecor.exe 87 PID 1344 wrote to memory of 2012 1344 omsecor.exe 99 PID 1344 wrote to memory of 2012 1344 omsecor.exe 99 PID 1344 wrote to memory of 2012 1344 omsecor.exe 99 PID 2012 wrote to memory of 1528 2012 omsecor.exe 100 PID 2012 wrote to memory of 1528 2012 omsecor.exe 100 PID 2012 wrote to memory of 1528 2012 omsecor.exe 100 PID 2012 wrote to memory of 1528 2012 omsecor.exe 100 PID 2012 wrote to memory of 1528 2012 omsecor.exe 100 PID 1528 wrote to memory of 1336 1528 omsecor.exe 102 PID 1528 wrote to memory of 1336 1528 omsecor.exe 102 PID 1528 wrote to memory of 1336 1528 omsecor.exe 102 PID 1336 wrote to memory of 4680 1336 omsecor.exe 103 PID 1336 wrote to memory of 4680 1336 omsecor.exe 103 PID 1336 wrote to memory of 4680 1336 omsecor.exe 103 PID 1336 wrote to memory of 4680 1336 omsecor.exe 103 PID 1336 wrote to memory of 4680 1336 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe"C:\Users\Admin\AppData\Local\Temp\4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exeC:\Users\Admin\AppData\Local\Temp\4c41d619b25e431c35686261990c9c8e90952128c9c0f46dc86c123c043fc1fa.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 2568⤵
- Program crash
PID:1508
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 2926⤵
- Program crash
PID:3052
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 2884⤵
- Program crash
PID:2776
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 2882⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4648 -ip 46481⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1476 -ip 14761⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2012 -ip 20121⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1336 -ip 13361⤵PID:1848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58574a4674586749c96faff190cd22c6d
SHA1c0534a0e8cc89f4ddefc0a2bf582afa595cd93e5
SHA256134a9758272c4ed1df21140f20ea5f0db4d5f564ff0aff5d7d6bf047b44c33f7
SHA512089f98706bbc8e1374780f01cb4c701caf6e4e8c5d47cf437a4582c332a5070cd321cf9e333c3ce067c755298177f6562bd570ac2e58f7584963e9abf1556ac8
-
Filesize
96KB
MD5fedc7ba54b918fa7934c8c2a70966d16
SHA118f8d25f91d2e719b2b4c4fd3b716230128f5792
SHA256817ab325945f2b62308787dbc2a4147321af0805403ca893a304e3d0a682014e
SHA51230513d5cbd32db71ebb48cb73c4e0f01384f05e63dbaa988e209f0d2ad406f5a26aa7919f28f1e674efdd95cb61fdb6f75c6d684a80623694f02ede25ba62cf8
-
Filesize
96KB
MD5e363a31493e4e644b80042fdcf5371a2
SHA1ae386051fdfbd2e18b20917c0dc3d8e60bcd551e
SHA256fe1d1ba4673e92d9800711f3a287d5a25329883b8348ccb8ee118c46f2deae69
SHA5122e40287f60fe78bfe1d647b9f8af955b6f74d3ff708801d22a9499b8189f976a1b245c1ce82aead95856d858dc56f3a995199525f8cc9f08ab6cfefcb97ead16