Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 07:02
Static task
static1
Behavioral task
behavioral1
Sample
6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe
Resource
win7-20240729-en
General
-
Target
6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe
-
Size
96KB
-
MD5
6d3dc9d6bd7adee40728b253e2eb0780
-
SHA1
a86a05578acb4d0627f7d85af8a39433da702194
-
SHA256
6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147b
-
SHA512
bf635ffe96a0b02ed884ad962d023f204bbe1d7a33fddc951cf1fcd34b7abc304ca5345287dd823c5413944433b3a14a358307fd0829dc29f3fe768e2fc48357
-
SSDEEP
1536:4nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:4Gs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4480 omsecor.exe 4248 omsecor.exe 2404 omsecor.exe 3628 omsecor.exe 2436 omsecor.exe 4496 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4836 set thread context of 3236 4836 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 83 PID 4480 set thread context of 4248 4480 omsecor.exe 87 PID 2404 set thread context of 3628 2404 omsecor.exe 109 PID 2436 set thread context of 4496 2436 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4680 4836 WerFault.exe 82 2076 4480 WerFault.exe 1856 2404 WerFault.exe 108 2440 2436 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4836 wrote to memory of 3236 4836 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 83 PID 4836 wrote to memory of 3236 4836 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 83 PID 4836 wrote to memory of 3236 4836 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 83 PID 4836 wrote to memory of 3236 4836 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 83 PID 4836 wrote to memory of 3236 4836 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 83 PID 3236 wrote to memory of 4480 3236 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 86 PID 3236 wrote to memory of 4480 3236 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 86 PID 3236 wrote to memory of 4480 3236 6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe 86 PID 4480 wrote to memory of 4248 4480 omsecor.exe 87 PID 4480 wrote to memory of 4248 4480 omsecor.exe 87 PID 4480 wrote to memory of 4248 4480 omsecor.exe 87 PID 4480 wrote to memory of 4248 4480 omsecor.exe 87 PID 4480 wrote to memory of 4248 4480 omsecor.exe 87 PID 4248 wrote to memory of 2404 4248 omsecor.exe 108 PID 4248 wrote to memory of 2404 4248 omsecor.exe 108 PID 4248 wrote to memory of 2404 4248 omsecor.exe 108 PID 2404 wrote to memory of 3628 2404 omsecor.exe 109 PID 2404 wrote to memory of 3628 2404 omsecor.exe 109 PID 2404 wrote to memory of 3628 2404 omsecor.exe 109 PID 2404 wrote to memory of 3628 2404 omsecor.exe 109 PID 2404 wrote to memory of 3628 2404 omsecor.exe 109 PID 3628 wrote to memory of 2436 3628 omsecor.exe 111 PID 3628 wrote to memory of 2436 3628 omsecor.exe 111 PID 3628 wrote to memory of 2436 3628 omsecor.exe 111 PID 2436 wrote to memory of 4496 2436 omsecor.exe 113 PID 2436 wrote to memory of 4496 2436 omsecor.exe 113 PID 2436 wrote to memory of 4496 2436 omsecor.exe 113 PID 2436 wrote to memory of 4496 2436 omsecor.exe 113 PID 2436 wrote to memory of 4496 2436 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe"C:\Users\Admin\AppData\Local\Temp\6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exeC:\Users\Admin\AppData\Local\Temp\6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 2608⤵
- Program crash
PID:2440
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2926⤵
- Program crash
PID:1856
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 3004⤵
- Program crash
PID:2076
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 2882⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4836 -ip 48361⤵PID:3204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4480 -ip 44801⤵PID:1488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2404 -ip 24041⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2436 -ip 24361⤵PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD538d50e91825b4feac22944d34fe693bf
SHA1d60f928b37f28416b603122716e986abf310cece
SHA25616bf9cea5e82763db66e7724da8afe663d5f0f6ea00ca2a8666e69888421c06d
SHA51281a65315b40bf79bc66cb8eb383a9c5c7ac7a90887fdac66299a6366f6890a2292ce9ef986134a449d96ce2611e86ad8ae6ce9c7369c54bb4223d4e8a31a2b3d
-
Filesize
96KB
MD5df24be91929341411994d9c5d5df22c9
SHA1c947478174e353d33dad3244fc79ddae1be3e703
SHA256bb5f489b34c4001feae77f356975ffe2007b2c566820753122ced0ffc504a268
SHA512088f54fd412db3564f1be4e0ce79ad305cee6cae65ef3e65dcc3aa003927e0ddecf99326f789fb199988de5428eb0f4d451bc0cec1d82f417a61e148ea3c54ec
-
Filesize
96KB
MD5cf6b7fcae2d195eb650ee306209ffce8
SHA1a8ff851ea5e3ead1b98d1a670da91b3cc44be666
SHA2567b1112f84dc49ea721b01c9e4f47114b993c4b65c0be981c47f0dc9220641353
SHA512b93d284a03a77aba73b98672e0ccbc325772b4e0618785afe5c474fc3bc0bc0d804778a71b267dc68859683ea6d0aedef9f160cbc573d756d1f6cc779233c8c4