Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 18:24
Static task
static1
Behavioral task
behavioral1
Sample
d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe
Resource
win7-20240903-en
General
-
Target
d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe
-
Size
96KB
-
MD5
51d9102330c347eec39456dfea0e2d58
-
SHA1
603e97d3c486a8bae37ad8ddfe090d5db138d77e
-
SHA256
d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8
-
SHA512
44690610ebf5a671cad8a667f7f82c0f635fcb9ec2349574c15fe4aa7729e632667eda0b13f781ac1a9cc44d2da7f09b61a04e6ad93df5285aaf0748506ed9a3
-
SSDEEP
1536:/nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:/Gs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3036 omsecor.exe 4820 omsecor.exe 1044 omsecor.exe 2800 omsecor.exe 3244 omsecor.exe 716 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1488 set thread context of 4192 1488 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 83 PID 3036 set thread context of 4820 3036 omsecor.exe 88 PID 1044 set thread context of 2800 1044 omsecor.exe 107 PID 3244 set thread context of 716 3244 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 720 1488 WerFault.exe 82 4188 3036 WerFault.exe 86 3996 1044 WerFault.exe 106 4472 3244 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1488 wrote to memory of 4192 1488 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 83 PID 1488 wrote to memory of 4192 1488 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 83 PID 1488 wrote to memory of 4192 1488 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 83 PID 1488 wrote to memory of 4192 1488 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 83 PID 1488 wrote to memory of 4192 1488 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 83 PID 4192 wrote to memory of 3036 4192 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 86 PID 4192 wrote to memory of 3036 4192 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 86 PID 4192 wrote to memory of 3036 4192 d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe 86 PID 3036 wrote to memory of 4820 3036 omsecor.exe 88 PID 3036 wrote to memory of 4820 3036 omsecor.exe 88 PID 3036 wrote to memory of 4820 3036 omsecor.exe 88 PID 3036 wrote to memory of 4820 3036 omsecor.exe 88 PID 3036 wrote to memory of 4820 3036 omsecor.exe 88 PID 4820 wrote to memory of 1044 4820 omsecor.exe 106 PID 4820 wrote to memory of 1044 4820 omsecor.exe 106 PID 4820 wrote to memory of 1044 4820 omsecor.exe 106 PID 1044 wrote to memory of 2800 1044 omsecor.exe 107 PID 1044 wrote to memory of 2800 1044 omsecor.exe 107 PID 1044 wrote to memory of 2800 1044 omsecor.exe 107 PID 1044 wrote to memory of 2800 1044 omsecor.exe 107 PID 1044 wrote to memory of 2800 1044 omsecor.exe 107 PID 2800 wrote to memory of 3244 2800 omsecor.exe 109 PID 2800 wrote to memory of 3244 2800 omsecor.exe 109 PID 2800 wrote to memory of 3244 2800 omsecor.exe 109 PID 3244 wrote to memory of 716 3244 omsecor.exe 111 PID 3244 wrote to memory of 716 3244 omsecor.exe 111 PID 3244 wrote to memory of 716 3244 omsecor.exe 111 PID 3244 wrote to memory of 716 3244 omsecor.exe 111 PID 3244 wrote to memory of 716 3244 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe"C:\Users\Admin\AppData\Local\Temp\d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exeC:\Users\Admin\AppData\Local\Temp\d48841402fa017d9c240845552cd6aeecf5b4fef96f5d537040a90ae16278ed8.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 2688⤵
- Program crash
PID:4472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 2926⤵
- Program crash
PID:3996
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 2884⤵
- Program crash
PID:4188
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 2882⤵
- Program crash
PID:720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1488 -ip 14881⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3036 -ip 30361⤵PID:608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1044 -ip 10441⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3244 -ip 32441⤵PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c6cb30019d0aedb07a6374ee4a297be7
SHA15939f5c961ee1c83755b212a72ce16b01333a24e
SHA256c9d9058827771f92a6d0361fd8aa511d74c9d9413c33283c041342493cbd2f9a
SHA512ac4bdb834919ce0e7b884f2b9c38d0579792c79d852d4a03b58eeb043f6fc9a1beb24bcc113e9e8f5b0757e84844d0573a15a4833af49645c2724293e18ec48b
-
Filesize
96KB
MD5a8b0e7da2c94140409c0e5d684b86bfd
SHA1630560aecbc9589cb32b44d72579cd86fa7dd012
SHA25666cab24bc25530e6b26dceb4d90f466f30ccab779c13b4e56214ba714ee99c18
SHA512a7f076c764566c7efea9e8af4b82841799a20857eb79aee62db29815214012ea6cdded1c3215860e35a41244a85ac3b30bd49528736c928fd6c662f65dfd338d
-
Filesize
96KB
MD5e608b547ebe6c01416342893d5105961
SHA1409bd6674d68a30e288d838e2157571255df7b1f
SHA25650ae39d52783e8ce12c6b96c6451c5a47ed629f57534c491f0a6e47275987fb5
SHA5123cd82bbab25c1a9d81e4812abcd10fd6a70344e0a9d5ceb1c48cea5c1d6653ca00aa16abb7ff7184a755dafd58bae69e508c252e81072e24ad7b08d6033429ff