Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 14:02
Static task
static1
Behavioral task
behavioral1
Sample
ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe
Resource
win7-20240903-en
General
-
Target
ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe
-
Size
96KB
-
MD5
4fdc5b677988c7885e6b14e5a0c505c0
-
SHA1
14880f4ab2c99d1ca349809190b4bc71b8cb94ea
-
SHA256
ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3
-
SHA512
59831e9966e15e173a5b00c9fe8c03937c4a5d037a496cd99e4d92448d469c7375020eee5a7a542340d978d58087d389716de4ad5eb2a2056adae9bdb837971b
-
SSDEEP
1536:LnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxO:LGs8cd8eXlYairZYqMddH13O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2072 omsecor.exe 3540 omsecor.exe 3036 omsecor.exe 1304 omsecor.exe 2952 omsecor.exe 756 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1760 set thread context of 4792 1760 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 82 PID 2072 set thread context of 3540 2072 omsecor.exe 86 PID 3036 set thread context of 1304 3036 omsecor.exe 100 PID 2952 set thread context of 756 2952 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2112 2072 WerFault.exe 85 3316 1760 WerFault.exe 81 5072 3036 WerFault.exe 99 3116 2952 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1760 wrote to memory of 4792 1760 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 82 PID 1760 wrote to memory of 4792 1760 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 82 PID 1760 wrote to memory of 4792 1760 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 82 PID 1760 wrote to memory of 4792 1760 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 82 PID 1760 wrote to memory of 4792 1760 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 82 PID 4792 wrote to memory of 2072 4792 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 85 PID 4792 wrote to memory of 2072 4792 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 85 PID 4792 wrote to memory of 2072 4792 ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe 85 PID 2072 wrote to memory of 3540 2072 omsecor.exe 86 PID 2072 wrote to memory of 3540 2072 omsecor.exe 86 PID 2072 wrote to memory of 3540 2072 omsecor.exe 86 PID 2072 wrote to memory of 3540 2072 omsecor.exe 86 PID 2072 wrote to memory of 3540 2072 omsecor.exe 86 PID 3540 wrote to memory of 3036 3540 omsecor.exe 99 PID 3540 wrote to memory of 3036 3540 omsecor.exe 99 PID 3540 wrote to memory of 3036 3540 omsecor.exe 99 PID 3036 wrote to memory of 1304 3036 omsecor.exe 100 PID 3036 wrote to memory of 1304 3036 omsecor.exe 100 PID 3036 wrote to memory of 1304 3036 omsecor.exe 100 PID 3036 wrote to memory of 1304 3036 omsecor.exe 100 PID 3036 wrote to memory of 1304 3036 omsecor.exe 100 PID 1304 wrote to memory of 2952 1304 omsecor.exe 102 PID 1304 wrote to memory of 2952 1304 omsecor.exe 102 PID 1304 wrote to memory of 2952 1304 omsecor.exe 102 PID 2952 wrote to memory of 756 2952 omsecor.exe 104 PID 2952 wrote to memory of 756 2952 omsecor.exe 104 PID 2952 wrote to memory of 756 2952 omsecor.exe 104 PID 2952 wrote to memory of 756 2952 omsecor.exe 104 PID 2952 wrote to memory of 756 2952 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe"C:\Users\Admin\AppData\Local\Temp\ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exeC:\Users\Admin\AppData\Local\Temp\ad8802801177bd9be07752b123f91723388ede203baca6f0dc749461202ff1c3N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 2568⤵
- Program crash
PID:3116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 2926⤵
- Program crash
PID:5072
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 3004⤵
- Program crash
PID:2112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 2882⤵
- Program crash
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1760 -ip 17601⤵PID:3224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2072 -ip 20721⤵PID:3960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3036 -ip 30361⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2952 -ip 29521⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f263657d45d97792bb0cb313b3a95085
SHA1c393d7ae97772a0d28ddf816deff523b3cb612c8
SHA256c917269a10a4ba5d3ea0d38f0dbb4d5f2db0eef1920d506626fff7c8be194094
SHA512445946a6ba199373ee1f2af109a2c54e2919bb29ab46bcc8bc511df1b9f67f391fc97b129e5a1a5c8e425c20d8ac31268aab398a7c5e4a411903e7ed4e6b0c71
-
Filesize
96KB
MD54124807dc4306feab598aadbce7409f8
SHA102f818dae5160c130f63cb6280e2666ba6d144f5
SHA2566d4390d6050a19e0ecb040f0d2fe7a84909b59bb34d35de7816dd0b8bcd2b2f8
SHA51243d7930035a128084880907f3c1a5f2e468fba57629bb4bbe65c0f515b03177aa0aced2299c51c18f5d640940b70af0d7b939341e5d3e4dcba190505e8dc290d
-
Filesize
96KB
MD5cafa9a1d4f4ec59766043ffb5cdb88d8
SHA1ebeeb5b04e17a1ba5f5f7e55a27784b168982862
SHA256aa9e235468947dfb93db469266d05c7b46def67d9d31934d73851ac9f7a28f00
SHA512b29cb7fa25158ff1b1f039b4405b67183f5254f932cd61d812e38749caf380acc94bbb6ee824ab824d8205358e5954fe84fb05595edfb252ca49029ddfee78aa