Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 02:21
Static task
static1
Behavioral task
behavioral1
Sample
9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe
Resource
win7-20241010-en
General
-
Target
9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe
-
Size
96KB
-
MD5
8ceb10f03128c8cde176c11bb6428710
-
SHA1
9c7b83021d362fd5ded21a64e17cdedfa8dff696
-
SHA256
9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69
-
SHA512
cf0223b954c096322c410b51a670bce03f68634dc7dfd5be1eba05335e50e7499d66a60da08b0a4a06d58dcdf665f008b8639f2912f7ab9c5849d48a1e920bc7
-
SSDEEP
1536:/nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:/Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 460 omsecor.exe 4460 omsecor.exe 3668 omsecor.exe 3352 omsecor.exe 4956 omsecor.exe 2588 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2652 set thread context of 2708 2652 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 83 PID 460 set thread context of 4460 460 omsecor.exe 88 PID 3668 set thread context of 3352 3668 omsecor.exe 108 PID 4956 set thread context of 2588 4956 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 1360 2652 WerFault.exe 82 1220 460 WerFault.exe 86 2124 3668 WerFault.exe 107 1312 4956 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2708 2652 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 83 PID 2652 wrote to memory of 2708 2652 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 83 PID 2652 wrote to memory of 2708 2652 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 83 PID 2652 wrote to memory of 2708 2652 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 83 PID 2652 wrote to memory of 2708 2652 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 83 PID 2708 wrote to memory of 460 2708 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 86 PID 2708 wrote to memory of 460 2708 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 86 PID 2708 wrote to memory of 460 2708 9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe 86 PID 460 wrote to memory of 4460 460 omsecor.exe 88 PID 460 wrote to memory of 4460 460 omsecor.exe 88 PID 460 wrote to memory of 4460 460 omsecor.exe 88 PID 460 wrote to memory of 4460 460 omsecor.exe 88 PID 460 wrote to memory of 4460 460 omsecor.exe 88 PID 4460 wrote to memory of 3668 4460 omsecor.exe 107 PID 4460 wrote to memory of 3668 4460 omsecor.exe 107 PID 4460 wrote to memory of 3668 4460 omsecor.exe 107 PID 3668 wrote to memory of 3352 3668 omsecor.exe 108 PID 3668 wrote to memory of 3352 3668 omsecor.exe 108 PID 3668 wrote to memory of 3352 3668 omsecor.exe 108 PID 3668 wrote to memory of 3352 3668 omsecor.exe 108 PID 3668 wrote to memory of 3352 3668 omsecor.exe 108 PID 3352 wrote to memory of 4956 3352 omsecor.exe 110 PID 3352 wrote to memory of 4956 3352 omsecor.exe 110 PID 3352 wrote to memory of 4956 3352 omsecor.exe 110 PID 4956 wrote to memory of 2588 4956 omsecor.exe 111 PID 4956 wrote to memory of 2588 4956 omsecor.exe 111 PID 4956 wrote to memory of 2588 4956 omsecor.exe 111 PID 4956 wrote to memory of 2588 4956 omsecor.exe 111 PID 4956 wrote to memory of 2588 4956 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe"C:\Users\Admin\AppData\Local\Temp\9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exeC:\Users\Admin\AppData\Local\Temp\9415570091aaa7a9ee86658f30875442af87c671c7fd75b565e2758870955f69N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 2688⤵
- Program crash
PID:1312
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 2926⤵
- Program crash
PID:2124
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 3004⤵
- Program crash
PID:1220
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 2522⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2652 -ip 26521⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 460 -ip 4601⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3668 -ip 36681⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4956 -ip 49561⤵PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c1146d04841b173ad9aba7ecec549e33
SHA1f2f92d423060fa6b9c15087860f367dad52867f6
SHA256f1880896e2d1c4df548ec05dc647b11f8667222b50c4aa91470fb19aa538faec
SHA5120fcdd9dba7057b737fd5465e7dcf8ad1e450109a7d5339f7cb894c0765975376f989d97ed3a680e34c35a49ba808ece1ec18bc943902181f26c65f042402e033
-
Filesize
96KB
MD52664bf6e18cf22f0241986f5047276c4
SHA196f1f6bc66009c3b0dbaef19277118014e433a35
SHA25624a1b10733afdaf9a97ed08a48969da5f21877d6c6f70d4be61358b6d7adbc94
SHA512f7249d9e1bf503377f08681dfc010df35500ad49ccbef1e8503564230cbe28dddfa970bd163a16ebf785f057b0c666b52dd285204fa8c0bb709f2819b675fecf
-
Filesize
96KB
MD57bf00cd2a07cf7bf48cdd00661bcf826
SHA10503139d805fea44d354e0f32ec3f9279514346f
SHA2567c8838fc06ad93bd0361323a2671dbce61bd57e141e253c65f84092a1df79763
SHA51231c57edfa408e5f598494a91fbf4b95b864c5e273223cf1df1ec2881eab46b39f8641f1fa5681afce8f61337813709d0fffa71ed9bc433266304f9acd0c2f86a