Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 08:25
Static task
static1
Behavioral task
behavioral1
Sample
1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe
Resource
win7-20240903-en
General
-
Target
1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe
-
Size
96KB
-
MD5
de08d653fa129b10cd40b2b869573be8
-
SHA1
2164c63aced87d14e6544bd63cf79f4d2f5d4aca
-
SHA256
1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5
-
SHA512
06bb45bfe88c50892fc2b23faf9ddb22a211378dda508a6fee2a6561ce864ee08a7a187b34839f69a4e3b965f9b9d9c896b312245fd8d60368e6659e178bfd66
-
SSDEEP
1536:NnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:NGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 772 omsecor.exe 408 omsecor.exe 2776 omsecor.exe 2804 omsecor.exe 3852 omsecor.exe 1648 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2364 set thread context of 216 2364 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 82 PID 772 set thread context of 408 772 omsecor.exe 87 PID 2776 set thread context of 2804 2776 omsecor.exe 100 PID 3852 set thread context of 1648 3852 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2348 2364 WerFault.exe 81 2664 772 WerFault.exe 84 2008 2776 WerFault.exe 99 2704 3852 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2364 wrote to memory of 216 2364 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 82 PID 2364 wrote to memory of 216 2364 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 82 PID 2364 wrote to memory of 216 2364 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 82 PID 2364 wrote to memory of 216 2364 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 82 PID 2364 wrote to memory of 216 2364 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 82 PID 216 wrote to memory of 772 216 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 84 PID 216 wrote to memory of 772 216 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 84 PID 216 wrote to memory of 772 216 1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe 84 PID 772 wrote to memory of 408 772 omsecor.exe 87 PID 772 wrote to memory of 408 772 omsecor.exe 87 PID 772 wrote to memory of 408 772 omsecor.exe 87 PID 772 wrote to memory of 408 772 omsecor.exe 87 PID 772 wrote to memory of 408 772 omsecor.exe 87 PID 408 wrote to memory of 2776 408 omsecor.exe 99 PID 408 wrote to memory of 2776 408 omsecor.exe 99 PID 408 wrote to memory of 2776 408 omsecor.exe 99 PID 2776 wrote to memory of 2804 2776 omsecor.exe 100 PID 2776 wrote to memory of 2804 2776 omsecor.exe 100 PID 2776 wrote to memory of 2804 2776 omsecor.exe 100 PID 2776 wrote to memory of 2804 2776 omsecor.exe 100 PID 2776 wrote to memory of 2804 2776 omsecor.exe 100 PID 2804 wrote to memory of 3852 2804 omsecor.exe 102 PID 2804 wrote to memory of 3852 2804 omsecor.exe 102 PID 2804 wrote to memory of 3852 2804 omsecor.exe 102 PID 3852 wrote to memory of 1648 3852 omsecor.exe 104 PID 3852 wrote to memory of 1648 3852 omsecor.exe 104 PID 3852 wrote to memory of 1648 3852 omsecor.exe 104 PID 3852 wrote to memory of 1648 3852 omsecor.exe 104 PID 3852 wrote to memory of 1648 3852 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe"C:\Users\Admin\AppData\Local\Temp\1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exeC:\Users\Admin\AppData\Local\Temp\1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 2448⤵
- Program crash
PID:2704
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 3126⤵
- Program crash
PID:2008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 3004⤵
- Program crash
PID:2664
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 3002⤵
- Program crash
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2364 -ip 23641⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 772 -ip 7721⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2776 -ip 27761⤵PID:4600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3852 -ip 38521⤵PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5514fcf52ac21b819499e4936b2a2998a
SHA172b40a50175ec7f3f011284de2daca8821789e3b
SHA25628861112f2b202751719202ed433edab9ec847c2be485173a12aa6089dbaafe0
SHA5122f0489af43cc6154de5c6f02e9052c2f315a4617fc7bed481191eb6e4033ae6ee8e9e74a96ea80ea17625fb353d51f30d49b7694178f618d6a8bb1730cb4e7d8
-
Filesize
96KB
MD5fdce8879327ace3e78a5b3d507032650
SHA10fed7aa14e8ee03a80b20bd6948d230e1127a550
SHA25675389f80b36d5d36ff5f6f1cb2ab9436dad0ceace924191551c5d0feac620de5
SHA51230bfd31a7a8e7a64dbdeae3592529fcd8ced241268d027f0f47765deaf128f031c86b2d7d335844b3791df446462760ce04cf9679d4b5b2f21f6e855d6be6f48
-
Filesize
96KB
MD52c6b1b06d646bc804b2988ee8d66e671
SHA18c34720ea5a91482dbf3c1c821f04c4e48c3b990
SHA2567bf5545c690b9ac37bb50d2280d10afb940bbf7a1507149806335cfe257af6a8
SHA5126c65d2c9a20a59104a99003371fa46669a7fb693553ebb900634106581d1dbdd2dc60a92f369d0ed52f52305865ccb17cae51343a7ab045467c5c40773f64338