Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 15:12
Static task
static1
Behavioral task
behavioral1
Sample
c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe
Resource
win7-20240903-en
General
-
Target
c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe
-
Size
96KB
-
MD5
727d467bdd8b079da7d3d114a32f64a0
-
SHA1
a7fcc4f0b24e119b9b22817a3ed7ba8d9ec03435
-
SHA256
c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19
-
SHA512
5b2e2a8e613da625a32efd01a5e4c4b7ae014c30bcb4601d84b2d57bfa84dc04c8af08cb6129a5b94876287e242ed178d03619529c35e46b125c6ae9138548ec
-
SSDEEP
1536:tnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:tGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3772 omsecor.exe 728 omsecor.exe 1808 omsecor.exe 4448 omsecor.exe 4692 omsecor.exe 1804 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5112 set thread context of 4332 5112 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 87 PID 3772 set thread context of 728 3772 omsecor.exe 92 PID 1808 set thread context of 4448 1808 omsecor.exe 113 PID 4692 set thread context of 1804 4692 omsecor.exe 117 -
Program crash 4 IoCs
pid pid_target Process procid_target 4212 5112 WerFault.exe 86 2724 3772 WerFault.exe 89 1392 1808 WerFault.exe 112 4576 4692 WerFault.exe 115 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4332 5112 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 87 PID 5112 wrote to memory of 4332 5112 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 87 PID 5112 wrote to memory of 4332 5112 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 87 PID 5112 wrote to memory of 4332 5112 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 87 PID 5112 wrote to memory of 4332 5112 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 87 PID 4332 wrote to memory of 3772 4332 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 89 PID 4332 wrote to memory of 3772 4332 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 89 PID 4332 wrote to memory of 3772 4332 c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe 89 PID 3772 wrote to memory of 728 3772 omsecor.exe 92 PID 3772 wrote to memory of 728 3772 omsecor.exe 92 PID 3772 wrote to memory of 728 3772 omsecor.exe 92 PID 3772 wrote to memory of 728 3772 omsecor.exe 92 PID 3772 wrote to memory of 728 3772 omsecor.exe 92 PID 728 wrote to memory of 1808 728 omsecor.exe 112 PID 728 wrote to memory of 1808 728 omsecor.exe 112 PID 728 wrote to memory of 1808 728 omsecor.exe 112 PID 1808 wrote to memory of 4448 1808 omsecor.exe 113 PID 1808 wrote to memory of 4448 1808 omsecor.exe 113 PID 1808 wrote to memory of 4448 1808 omsecor.exe 113 PID 1808 wrote to memory of 4448 1808 omsecor.exe 113 PID 1808 wrote to memory of 4448 1808 omsecor.exe 113 PID 4448 wrote to memory of 4692 4448 omsecor.exe 115 PID 4448 wrote to memory of 4692 4448 omsecor.exe 115 PID 4448 wrote to memory of 4692 4448 omsecor.exe 115 PID 4692 wrote to memory of 1804 4692 omsecor.exe 117 PID 4692 wrote to memory of 1804 4692 omsecor.exe 117 PID 4692 wrote to memory of 1804 4692 omsecor.exe 117 PID 4692 wrote to memory of 1804 4692 omsecor.exe 117 PID 4692 wrote to memory of 1804 4692 omsecor.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe"C:\Users\Admin\AppData\Local\Temp\c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exeC:\Users\Admin\AppData\Local\Temp\c391e11cbfc87e81cca19d260339ea7aab4fcbd65627049655a80ca58e75bc19N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 2408⤵
- Program crash
PID:4576
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 2926⤵
- Program crash
PID:1392
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 3004⤵
- Program crash
PID:2724
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 3002⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5112 -ip 51121⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3772 -ip 37721⤵PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1808 -ip 18081⤵PID:2540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4692 -ip 46921⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c8b5ecc787e660ea8758b2f448942431
SHA1c1a7e6c95a091b5221fb33fb64da64c249e88aa9
SHA25669d9a957b8197b54e8fa98a1b71a4a4c94164ac6e7bc4e06945a9e43de4e7712
SHA512e27942a4f05fb8d9f0cd4b31eee5c55c18dc05a9ab08a0a8c22c0d1751acd232bbfcd72dd68c0cc2d5e8076e4d70026879194397baf8b1475be02d46db399682
-
Filesize
96KB
MD5d0ad9fb677daa5735994745e533950c1
SHA1d466df3afad595f10dbac1176484081b661115b3
SHA2568bf742aa1c5185b1faade0bda9b852f4c3f7e51e96bac0cc2261b25298fca8ef
SHA512ac55606ccea098bd556c7d1636621a45ea22ae454c28e12ff8f802b2cd64b3e39531efbcb08a75b04477bab8a8353f51c68b14a8239115a4ddde27a6d90511da
-
Filesize
96KB
MD50d5beb482aad559a289d59055c95e900
SHA189a65ff9c57fc3cde4675768d894470eb8aa3a16
SHA2569a3d2071d3280d54d205092a057392777f12a396ecac2a936d6838fdab71a3f5
SHA512d01aa84fc9307a994693540508cf48908d19e9034e82e2321ef548c850988b4ebef74e5895cd3b3c13910867787dbdf1625c99df60c4e75617c7044d41b2d668