Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 23:13
Static task
static1
Behavioral task
behavioral1
Sample
0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe
Resource
win7-20241023-en
General
-
Target
0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe
-
Size
96KB
-
MD5
fc5a521412e14ee3f5b104f3dedadc8d
-
SHA1
59680b4ac14161838dd50c7eb936cc63330c3b55
-
SHA256
0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5
-
SHA512
30d02b940b8a4f959e0aec29a6c382a6dd214a0453ee1e3c7ce83a23aeeeb1520ef4075568ac270f4ba5b0ee771475b65e96b595fa6a00495d6ae7bd14ae5812
-
SSDEEP
1536:HnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:HGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1848 omsecor.exe 4048 omsecor.exe 260 omsecor.exe 4676 omsecor.exe 1456 omsecor.exe 3460 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1576 set thread context of 2920 1576 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 82 PID 1848 set thread context of 4048 1848 omsecor.exe 87 PID 260 set thread context of 4676 260 omsecor.exe 100 PID 1456 set thread context of 3460 1456 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4516 1576 WerFault.exe 81 3988 1848 WerFault.exe 84 2460 260 WerFault.exe 99 1580 1456 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2920 1576 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 82 PID 1576 wrote to memory of 2920 1576 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 82 PID 1576 wrote to memory of 2920 1576 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 82 PID 1576 wrote to memory of 2920 1576 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 82 PID 1576 wrote to memory of 2920 1576 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 82 PID 2920 wrote to memory of 1848 2920 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 84 PID 2920 wrote to memory of 1848 2920 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 84 PID 2920 wrote to memory of 1848 2920 0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe 84 PID 1848 wrote to memory of 4048 1848 omsecor.exe 87 PID 1848 wrote to memory of 4048 1848 omsecor.exe 87 PID 1848 wrote to memory of 4048 1848 omsecor.exe 87 PID 1848 wrote to memory of 4048 1848 omsecor.exe 87 PID 1848 wrote to memory of 4048 1848 omsecor.exe 87 PID 4048 wrote to memory of 260 4048 omsecor.exe 99 PID 4048 wrote to memory of 260 4048 omsecor.exe 99 PID 4048 wrote to memory of 260 4048 omsecor.exe 99 PID 260 wrote to memory of 4676 260 omsecor.exe 100 PID 260 wrote to memory of 4676 260 omsecor.exe 100 PID 260 wrote to memory of 4676 260 omsecor.exe 100 PID 260 wrote to memory of 4676 260 omsecor.exe 100 PID 260 wrote to memory of 4676 260 omsecor.exe 100 PID 4676 wrote to memory of 1456 4676 omsecor.exe 102 PID 4676 wrote to memory of 1456 4676 omsecor.exe 102 PID 4676 wrote to memory of 1456 4676 omsecor.exe 102 PID 1456 wrote to memory of 3460 1456 omsecor.exe 104 PID 1456 wrote to memory of 3460 1456 omsecor.exe 104 PID 1456 wrote to memory of 3460 1456 omsecor.exe 104 PID 1456 wrote to memory of 3460 1456 omsecor.exe 104 PID 1456 wrote to memory of 3460 1456 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe"C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exeC:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 2688⤵
- Program crash
PID:1580
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 260 -s 2926⤵
- Program crash
PID:2460
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1848 -s 3004⤵
- Program crash
PID:3988
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 3002⤵
- Program crash
PID:4516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1576 -ip 15761⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1848 -ip 18481⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 260 -ip 2601⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1456 -ip 14561⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b3c9ccf5e69f3278bfa46d3f5c5b7980
SHA19fcac716b9dfbf4c53c8438ff380e50e4369d654
SHA256c70e3d971878b361136fb9751603d8242a002d12603523d3f07a3888c47fa2f0
SHA51218b2e04837b8da2cabc288524eff6c8cb0829a732fd7c7adaa89a147512ab8bc45917b55b42e8a7e1e269f935b1338e8ef92e9ab3029fcef351a670e7d6afd1d
-
Filesize
96KB
MD55426ac3522d36db2f82844fe2b686018
SHA1bf4da61b45f2e0f084d21b423d59364bf79ce082
SHA256f6ef8b48f1e7dad6453cfbe679899863d8cad610e0280d2e2e6465af1d120efb
SHA512e11d5ac86cd699c7ad2b8d0acfce64f681ff03295a81304e4a79f22507d2f44ed70d9d93f7d96107ed4b6fd19a2ef5817ba2a22bfd28efb3dd4b237441bb241e
-
Filesize
96KB
MD5da350dcce45eba6e1079ab5341a4b5ef
SHA13603478f0aef41c420682d12353d64a0bfa581b7
SHA256d93602fa112cd6bc53950c583c8ca837161506d854cdc8dbc788bad9d0d9ad7e
SHA51201d17e4dc589b201a5b69a6a963d9f31c2cba1487a2443dd4e1b6834dd714651e8b9ce4aaf83acc23387017b539a8862dfae8c38f087f5a2f100d2fcc76334c9