Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 08:05
Static task
static1
Behavioral task
behavioral1
Sample
59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe
Resource
win7-20240903-en
General
-
Target
59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe
-
Size
96KB
-
MD5
8b2b21eebd1bb8f8765fff013b065ad0
-
SHA1
d838fa05cc4652376e0af6ec511417e5be1b68a3
-
SHA256
59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250
-
SHA512
d5e7ceac818d5cd23e53e999ce4f6633aaa4bfdb0838a3d59e11d1827fcab1d2d226fcab129a0a09a32c95fb672c08e3b2b843ef711c9ae6e60f3ad627df68dd
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:xGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3964 omsecor.exe 4232 omsecor.exe 3036 omsecor.exe 4416 omsecor.exe 5080 omsecor.exe 4100 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2760 set thread context of 4916 2760 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 83 PID 3964 set thread context of 4232 3964 omsecor.exe 87 PID 3036 set thread context of 4416 3036 omsecor.exe 108 PID 5080 set thread context of 4100 5080 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 1772 2760 WerFault.exe 82 1680 3964 WerFault.exe 85 3292 5080 WerFault.exe 110 2228 3036 WerFault.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4916 2760 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 83 PID 2760 wrote to memory of 4916 2760 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 83 PID 2760 wrote to memory of 4916 2760 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 83 PID 2760 wrote to memory of 4916 2760 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 83 PID 2760 wrote to memory of 4916 2760 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 83 PID 4916 wrote to memory of 3964 4916 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 85 PID 4916 wrote to memory of 3964 4916 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 85 PID 4916 wrote to memory of 3964 4916 59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe 85 PID 3964 wrote to memory of 4232 3964 omsecor.exe 87 PID 3964 wrote to memory of 4232 3964 omsecor.exe 87 PID 3964 wrote to memory of 4232 3964 omsecor.exe 87 PID 3964 wrote to memory of 4232 3964 omsecor.exe 87 PID 3964 wrote to memory of 4232 3964 omsecor.exe 87 PID 4232 wrote to memory of 3036 4232 omsecor.exe 107 PID 4232 wrote to memory of 3036 4232 omsecor.exe 107 PID 4232 wrote to memory of 3036 4232 omsecor.exe 107 PID 3036 wrote to memory of 4416 3036 omsecor.exe 108 PID 3036 wrote to memory of 4416 3036 omsecor.exe 108 PID 3036 wrote to memory of 4416 3036 omsecor.exe 108 PID 3036 wrote to memory of 4416 3036 omsecor.exe 108 PID 3036 wrote to memory of 4416 3036 omsecor.exe 108 PID 4416 wrote to memory of 5080 4416 omsecor.exe 110 PID 4416 wrote to memory of 5080 4416 omsecor.exe 110 PID 4416 wrote to memory of 5080 4416 omsecor.exe 110 PID 5080 wrote to memory of 4100 5080 omsecor.exe 111 PID 5080 wrote to memory of 4100 5080 omsecor.exe 111 PID 5080 wrote to memory of 4100 5080 omsecor.exe 111 PID 5080 wrote to memory of 4100 5080 omsecor.exe 111 PID 5080 wrote to memory of 4100 5080 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe"C:\Users\Admin\AppData\Local\Temp\59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exeC:\Users\Admin\AppData\Local\Temp\59a8077f411ce233f7c26cf78db2299c8f4049aa30c8d143307c75987442f250N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 2688⤵
- Program crash
PID:3292
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3036 -s 2926⤵
- Program crash
PID:2228
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 2884⤵
- Program crash
PID:1680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2882⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2760 -ip 27601⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3964 -ip 39641⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3036 -ip 30361⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5080 -ip 50801⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57a3c80c4b6c92d9a7e2d89176897c667
SHA1cb405f106900af9f87428faafe23084d2efd7667
SHA256e05a91f1c457b676290cc51a6859b3c98a67979e3f59927a47960df3feeb29c4
SHA5125bbc800484ef73d2bbafdbeaaf047d83fbdcbd86b04a004255782ca06a44199091533565b65f44ed132edfe8d6a90079a3594a481a4b2821ca0795b16f68e06e
-
Filesize
96KB
MD5d50b0bea50f7465cc517056daf3246d6
SHA1a7951b8b88b403b49fa2d7f90afd3579a634bbb5
SHA2562ecd9bdc1d1fa15698b152a7d56348423632ba4b0c3b17a7a106081dac5e0abf
SHA512f4e7faa335caeb3b4a8c2281f5fe5c9cdbbb8c8d9b01640fcf87059f09f89e46a005821c61b5b4ce490a8a0ae4307cd01866b90c68974088411d13132db6692f
-
Filesize
96KB
MD5c007e7d8ef4098e522f24c155f1d18d6
SHA1f811fdc0753c358cee27a17311405819e2e087bb
SHA256d94b8794736543f6e82da0d8f5bb6efa17d104116ed6428efff4c8f0d8ed1ee9
SHA5127b43cac69a84d0dfa4e080a4569158c1fe0011d1b4488d59802ed7027f0ba8b51e3280b7b5cef7e8ea5499fb9145e2d09684ff8e6dbad3df0f6123e78ac4cbbe