Analysis
-
max time kernel
113s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 02:26
Static task
static1
Behavioral task
behavioral1
Sample
b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe
Resource
win7-20240708-en
General
-
Target
b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe
-
Size
96KB
-
MD5
4b183de46047ecc330a2936819f7f180
-
SHA1
582a75c867d8cb8ee5ba192594fb4b4de46026ee
-
SHA256
b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2
-
SHA512
d1be505c7b596d10496de7f391b2cf14704cb433332fa4569c9ef14944d83f93325a1a9828c0f5352a44dc239d119d0f931902f1146b48c8307449bd0a7f6bdc
-
SSDEEP
1536:SnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:SGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3020 omsecor.exe 1188 omsecor.exe 4384 omsecor.exe 4524 omsecor.exe 1948 omsecor.exe 1144 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 964 set thread context of 2892 964 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 83 PID 3020 set thread context of 1188 3020 omsecor.exe 87 PID 4384 set thread context of 4524 4384 omsecor.exe 109 PID 1948 set thread context of 1144 1948 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 1396 964 WerFault.exe 82 2044 3020 WerFault.exe 86 2044 4384 WerFault.exe 108 4084 1948 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 964 wrote to memory of 2892 964 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 83 PID 964 wrote to memory of 2892 964 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 83 PID 964 wrote to memory of 2892 964 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 83 PID 964 wrote to memory of 2892 964 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 83 PID 964 wrote to memory of 2892 964 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 83 PID 2892 wrote to memory of 3020 2892 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 86 PID 2892 wrote to memory of 3020 2892 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 86 PID 2892 wrote to memory of 3020 2892 b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe 86 PID 3020 wrote to memory of 1188 3020 omsecor.exe 87 PID 3020 wrote to memory of 1188 3020 omsecor.exe 87 PID 3020 wrote to memory of 1188 3020 omsecor.exe 87 PID 3020 wrote to memory of 1188 3020 omsecor.exe 87 PID 3020 wrote to memory of 1188 3020 omsecor.exe 87 PID 1188 wrote to memory of 4384 1188 omsecor.exe 108 PID 1188 wrote to memory of 4384 1188 omsecor.exe 108 PID 1188 wrote to memory of 4384 1188 omsecor.exe 108 PID 4384 wrote to memory of 4524 4384 omsecor.exe 109 PID 4384 wrote to memory of 4524 4384 omsecor.exe 109 PID 4384 wrote to memory of 4524 4384 omsecor.exe 109 PID 4384 wrote to memory of 4524 4384 omsecor.exe 109 PID 4384 wrote to memory of 4524 4384 omsecor.exe 109 PID 4524 wrote to memory of 1948 4524 omsecor.exe 111 PID 4524 wrote to memory of 1948 4524 omsecor.exe 111 PID 4524 wrote to memory of 1948 4524 omsecor.exe 111 PID 1948 wrote to memory of 1144 1948 omsecor.exe 113 PID 1948 wrote to memory of 1144 1948 omsecor.exe 113 PID 1948 wrote to memory of 1144 1948 omsecor.exe 113 PID 1948 wrote to memory of 1144 1948 omsecor.exe 113 PID 1948 wrote to memory of 1144 1948 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe"C:\Users\Admin\AppData\Local\Temp\b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exeC:\Users\Admin\AppData\Local\Temp\b25955d9fa51e1b1b24d673aeb38c815cf5aa570e6043f02160b81c34b2139f2N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 2568⤵
- Program crash
PID:4084
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 2926⤵
- Program crash
PID:2044
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 2884⤵
- Program crash
PID:2044
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 2882⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 964 -ip 9641⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3020 -ip 30201⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4384 -ip 43841⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1948 -ip 19481⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a40903cf3847fb42e3de7dc0697d8f5a
SHA18ba3f28a77d142e9edf73453df9999be2640ef53
SHA256ce1295492da44307e267e9389349bcd8c5d55626c2bcc3d6d8aec8b5f28bbbac
SHA512ee9aa85835c56d69e458ea4f8ef2d0528bca39500cd04f3b933603d9339080a0dbf7b14199723709951299864df9d9dd7ce5555a1fefaeac5d8845da3f6a43f3
-
Filesize
96KB
MD5bfdf0cc0164a46f99b8c4aae10ce0d34
SHA14c308671fa59fd074a50f3685414651ace5504dd
SHA2569fd3d4f734d92881408d89f47fc401d5c3bca6372b12ce30561491dce48e8db6
SHA5120197ed181c0e0d9db2d70b5ca7772ed3d895de24e2fce90ee0ed6f7da5b9bf790026e0cae3a188a3f8159361efc165617bb1dea40e9f12b87549c7a4bde96789
-
Filesize
96KB
MD51f73856f4e42af033754fe8a36c94a4c
SHA1aed5269e535d1679225c13728e90055243a1702f
SHA256e2f7028da3f4274c9c6fad416e0208c56b3c77aa28764fb836d032908159508b
SHA512a50969268854cb653e7eca53c817098895c618fb6dfc7f0d9e41510397c14b866975ae2973b843781807f09c295d390b5e82b03e44a90c98417ffc5c2fd76a0b