Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 14:01
Static task
static1
Behavioral task
behavioral1
Sample
e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe
Resource
win7-20241010-en
General
-
Target
e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe
-
Size
96KB
-
MD5
4da9f956e1aaf071e35e95cc5bb6e635
-
SHA1
6f7054da8b714c013e7664bed814d64a0bb7f77c
-
SHA256
e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a
-
SHA512
8cc9b428c0a646d5a7705622fc709acec0d38a8d17c711f2ba8ed838908085948f7049f1a574d7dc22babec9644354d20c26b3f74603221242e330e144defa8d
-
SSDEEP
1536:5nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:5Gs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1608 omsecor.exe 1260 omsecor.exe 2704 omsecor.exe 4340 omsecor.exe 2816 omsecor.exe 1380 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 640 set thread context of 3132 640 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 82 PID 1608 set thread context of 1260 1608 omsecor.exe 86 PID 2704 set thread context of 4340 2704 omsecor.exe 100 PID 2816 set thread context of 1380 2816 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 32 640 WerFault.exe 81 4872 1608 WerFault.exe 84 3472 2704 WerFault.exe 99 4776 2816 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 640 wrote to memory of 3132 640 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 82 PID 640 wrote to memory of 3132 640 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 82 PID 640 wrote to memory of 3132 640 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 82 PID 640 wrote to memory of 3132 640 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 82 PID 640 wrote to memory of 3132 640 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 82 PID 3132 wrote to memory of 1608 3132 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 84 PID 3132 wrote to memory of 1608 3132 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 84 PID 3132 wrote to memory of 1608 3132 e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe 84 PID 1608 wrote to memory of 1260 1608 omsecor.exe 86 PID 1608 wrote to memory of 1260 1608 omsecor.exe 86 PID 1608 wrote to memory of 1260 1608 omsecor.exe 86 PID 1608 wrote to memory of 1260 1608 omsecor.exe 86 PID 1608 wrote to memory of 1260 1608 omsecor.exe 86 PID 1260 wrote to memory of 2704 1260 omsecor.exe 99 PID 1260 wrote to memory of 2704 1260 omsecor.exe 99 PID 1260 wrote to memory of 2704 1260 omsecor.exe 99 PID 2704 wrote to memory of 4340 2704 omsecor.exe 100 PID 2704 wrote to memory of 4340 2704 omsecor.exe 100 PID 2704 wrote to memory of 4340 2704 omsecor.exe 100 PID 2704 wrote to memory of 4340 2704 omsecor.exe 100 PID 2704 wrote to memory of 4340 2704 omsecor.exe 100 PID 4340 wrote to memory of 2816 4340 omsecor.exe 102 PID 4340 wrote to memory of 2816 4340 omsecor.exe 102 PID 4340 wrote to memory of 2816 4340 omsecor.exe 102 PID 2816 wrote to memory of 1380 2816 omsecor.exe 104 PID 2816 wrote to memory of 1380 2816 omsecor.exe 104 PID 2816 wrote to memory of 1380 2816 omsecor.exe 104 PID 2816 wrote to memory of 1380 2816 omsecor.exe 104 PID 2816 wrote to memory of 1380 2816 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe"C:\Users\Admin\AppData\Local\Temp\e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exeC:\Users\Admin\AppData\Local\Temp\e7fad725bec06f485ee14fcb4a6d17cf079e1ed73a96d2d25fb7d43163e3b92a.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2608⤵
- Program crash
PID:4776
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 2926⤵
- Program crash
PID:3472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2884⤵
- Program crash
PID:4872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 3002⤵
- Program crash
PID:32
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 640 -ip 6401⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1608 -ip 16081⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2704 -ip 27041⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2816 -ip 28161⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD550198af7976c12fa881a5a6ddcb47396
SHA183adf058d1cf265078b04797ad5f2685e8cba41a
SHA256515e44aea78735f64894e7fac214291b9d4e068ab14181f6a2dde6423e75e008
SHA5122c1c4d21ce6ab19e8350c48eac23248f28fd67ed9559bb8a7a9ccecc257e26a183d94511d9bf2b7da579a784be5952eac9651f01c958c4a7177af131f1cb328e
-
Filesize
96KB
MD58449443b326f346db750b775da0c90be
SHA1377d69c62fcb5ea3b5ca289f4daa508806a5ee29
SHA256f2b1eee8e91db5f8273b135e248af806be89a4081f4d2303906b15ed23a9e6ba
SHA51241508e1d356eb5f22d237424fb06e20fe86d6d8e5d4638b813055d0c9a02b7296f253a89e2f70895ef78da4da9572c05c4be40db4655a3c968b422417dcab080
-
Filesize
96KB
MD5e58ac1f919facff3659b3a1e9c2891c7
SHA171af14ecbfe2c514c66d28ea41a45a8c4fab2791
SHA2568b70dcae242a14ce0594614f4dd761f14310c5626d41d5d597285a1f700282f7
SHA5125cb2df066abb996556fe9e88cd815835466a122fadfbbe1671cc329cd593777adb638bb16bc3ce761f033787a18e6a13eb659201b930b1e18b0230c08d46d10d