Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 03:33
Static task
static1
Behavioral task
behavioral1
Sample
1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe
Resource
win7-20240903-en
General
-
Target
1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe
-
Size
96KB
-
MD5
586bb056d66f7795ae2f1abe1b028480
-
SHA1
06364bd0a7b8198e864f7d45ad750789cdb3727b
-
SHA256
1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8e
-
SHA512
da67386310e6059a6dbd68cc1b69bc2bb7c19802c3114e9aba6627f5f8b5b3b9ef569b32de1b1bb7c6a22ba5bcd98f8eed34081e1ef3acd58f9808b40c4cb889
-
SSDEEP
1536:CnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:CGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3660 omsecor.exe 2816 omsecor.exe 3880 omsecor.exe 1864 omsecor.exe 2752 omsecor.exe 728 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1920 set thread context of 432 1920 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 83 PID 3660 set thread context of 2816 3660 omsecor.exe 88 PID 3880 set thread context of 1864 3880 omsecor.exe 108 PID 2752 set thread context of 728 2752 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4552 1920 WerFault.exe 82 2852 3660 WerFault.exe 86 884 3880 WerFault.exe 107 1840 2752 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1920 wrote to memory of 432 1920 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 83 PID 1920 wrote to memory of 432 1920 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 83 PID 1920 wrote to memory of 432 1920 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 83 PID 1920 wrote to memory of 432 1920 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 83 PID 1920 wrote to memory of 432 1920 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 83 PID 432 wrote to memory of 3660 432 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 86 PID 432 wrote to memory of 3660 432 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 86 PID 432 wrote to memory of 3660 432 1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe 86 PID 3660 wrote to memory of 2816 3660 omsecor.exe 88 PID 3660 wrote to memory of 2816 3660 omsecor.exe 88 PID 3660 wrote to memory of 2816 3660 omsecor.exe 88 PID 3660 wrote to memory of 2816 3660 omsecor.exe 88 PID 3660 wrote to memory of 2816 3660 omsecor.exe 88 PID 2816 wrote to memory of 3880 2816 omsecor.exe 107 PID 2816 wrote to memory of 3880 2816 omsecor.exe 107 PID 2816 wrote to memory of 3880 2816 omsecor.exe 107 PID 3880 wrote to memory of 1864 3880 omsecor.exe 108 PID 3880 wrote to memory of 1864 3880 omsecor.exe 108 PID 3880 wrote to memory of 1864 3880 omsecor.exe 108 PID 3880 wrote to memory of 1864 3880 omsecor.exe 108 PID 3880 wrote to memory of 1864 3880 omsecor.exe 108 PID 1864 wrote to memory of 2752 1864 omsecor.exe 110 PID 1864 wrote to memory of 2752 1864 omsecor.exe 110 PID 1864 wrote to memory of 2752 1864 omsecor.exe 110 PID 2752 wrote to memory of 728 2752 omsecor.exe 112 PID 2752 wrote to memory of 728 2752 omsecor.exe 112 PID 2752 wrote to memory of 728 2752 omsecor.exe 112 PID 2752 wrote to memory of 728 2752 omsecor.exe 112 PID 2752 wrote to memory of 728 2752 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe"C:\Users\Admin\AppData\Local\Temp\1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exeC:\Users\Admin\AppData\Local\Temp\1919427d05b6f678cebac0cd9daea41087a6fa72a4b5c08d72da4c144c94fa8eN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 2608⤵
- Program crash
PID:1840
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 2966⤵
- Program crash
PID:884
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 2884⤵
- Program crash
PID:2852
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 2882⤵
- Program crash
PID:4552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1920 -ip 19201⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3660 -ip 36601⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3880 -ip 38801⤵PID:688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2752 -ip 27521⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d2e8a50e62a808a936a777d81ca6de07
SHA1f37ddb52d09da4d7ee1b25815b0702773dd5fed1
SHA256a9328d1d27f270c8a64f12b0b7fe06a8ded8a1126d6d96c72a5104e0ff22327d
SHA5125301ab8cc251a26628098993178f8aa77ece60fd42353d5ff4aa78692820df36750fcb15bd0b946939e6cd7ea3615d51b82db27af7e0b41f5523cf1667cb1b02
-
Filesize
96KB
MD56537e46d8aeb0bbde28256f506da74b3
SHA15d60b643fd69a84cd25e09a4256e99c11c236dd8
SHA256b5196f352ae7bfee29cf2c1adb82a2a0541cd5bdf68eb50698cc91ece2287c48
SHA51217d953c8ce7412790de2731e619a1868a8fb0a480684f7a409d9781941dfa77209459d78e8bbd6b4eef15811174e46fc3cd4e6e440ed97a2d3907f8aaae12ca7
-
Filesize
96KB
MD5e1370208950f7b8c26c21b30def8095b
SHA1d5ee9ebfedea03dad9eaf1888f1922f3b82edde0
SHA2565ee77e9d2e489a2833dc4a5f4b94b60420c6b86ca3d856a02fde54aebb06145f
SHA512ebf8fbc9370175f7ad1418805d279f64caf299801dda0a842d83d7d465a19ea305a4ecb2ff223903418e69e70b18a6a75d4ea82f825f307cc02e987ba110c1b4