Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2025 19:11
Static task
static1
Behavioral task
behavioral1
Sample
196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe
Resource
win7-20240903-en
General
-
Target
196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe
-
Size
96KB
-
MD5
a8c0fcc2af31901e2a529fc64ae8cc81
-
SHA1
29b1dc02e111ef01c0963f650d9436cd0f0d4278
-
SHA256
196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432
-
SHA512
ac1486b5db71b9a3f56ee88e6321f595649691adc9c62908ba870f96a3fac47306685216696a31b422f8cf1e0e60d36dbff764ce5ab0a93dfaf4f0f7f0894c51
-
SSDEEP
1536:GnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:GGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4280 omsecor.exe 4556 omsecor.exe 1596 omsecor.exe 3756 omsecor.exe 1616 omsecor.exe 3944 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1224 set thread context of 2864 1224 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 81 PID 4280 set thread context of 4556 4280 omsecor.exe 86 PID 1596 set thread context of 3756 1596 omsecor.exe 100 PID 1616 set thread context of 3944 1616 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 1744 1224 WerFault.exe 80 3496 4280 WerFault.exe 84 5068 1596 WerFault.exe 99 2980 1616 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2864 1224 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 81 PID 1224 wrote to memory of 2864 1224 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 81 PID 1224 wrote to memory of 2864 1224 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 81 PID 1224 wrote to memory of 2864 1224 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 81 PID 1224 wrote to memory of 2864 1224 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 81 PID 2864 wrote to memory of 4280 2864 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 84 PID 2864 wrote to memory of 4280 2864 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 84 PID 2864 wrote to memory of 4280 2864 196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe 84 PID 4280 wrote to memory of 4556 4280 omsecor.exe 86 PID 4280 wrote to memory of 4556 4280 omsecor.exe 86 PID 4280 wrote to memory of 4556 4280 omsecor.exe 86 PID 4280 wrote to memory of 4556 4280 omsecor.exe 86 PID 4280 wrote to memory of 4556 4280 omsecor.exe 86 PID 4556 wrote to memory of 1596 4556 omsecor.exe 99 PID 4556 wrote to memory of 1596 4556 omsecor.exe 99 PID 4556 wrote to memory of 1596 4556 omsecor.exe 99 PID 1596 wrote to memory of 3756 1596 omsecor.exe 100 PID 1596 wrote to memory of 3756 1596 omsecor.exe 100 PID 1596 wrote to memory of 3756 1596 omsecor.exe 100 PID 1596 wrote to memory of 3756 1596 omsecor.exe 100 PID 1596 wrote to memory of 3756 1596 omsecor.exe 100 PID 3756 wrote to memory of 1616 3756 omsecor.exe 102 PID 3756 wrote to memory of 1616 3756 omsecor.exe 102 PID 3756 wrote to memory of 1616 3756 omsecor.exe 102 PID 1616 wrote to memory of 3944 1616 omsecor.exe 104 PID 1616 wrote to memory of 3944 1616 omsecor.exe 104 PID 1616 wrote to memory of 3944 1616 omsecor.exe 104 PID 1616 wrote to memory of 3944 1616 omsecor.exe 104 PID 1616 wrote to memory of 3944 1616 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe"C:\Users\Admin\AppData\Local\Temp\196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exeC:\Users\Admin\AppData\Local\Temp\196f443fd6abeb561100985d1c5e4be4066beb0344ac8ce4cfaefae881c77432.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2568⤵
- Program crash
PID:2980
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 2926⤵
- Program crash
PID:5068
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 2924⤵
- Program crash
PID:3496
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 2882⤵
- Program crash
PID:1744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1224 -ip 12241⤵PID:1048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4280 -ip 42801⤵PID:2996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1596 -ip 15961⤵PID:4900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1616 -ip 16161⤵PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52ee7c0af4717d88457e4c5d0293f5167
SHA129ad73ef59078a48ecd5a055f463c32520fbb78c
SHA256db9e5cf91b3883728ffea69739036ca41e905aa056a48b5b66f73a7014d57cff
SHA512d661f79187feb911b52b12259d515aed46e48e3f5fcaa7d2bd556596cff424c14925bb220b1f4cfd2e99ae7ee75e96807829d87051b6df7a7360829db191948d
-
Filesize
96KB
MD5d24fed6ff9bfbd7d0b611ac52adc7b6f
SHA1932e740998865fe22134d8846bda99b443c3fc33
SHA2567f4023f0a5f913fc2f430a4c1d87feda6c2b497c9038a574a9df8140b9a7fd3c
SHA512c534578ce285bea415e9ab48ccc14d711d4075b5b1d117cb637e51b846c8c24f8469a4e9ce342a98af74bc2c8f643be038f40aa436a9465f6597b8184128b3b3
-
Filesize
96KB
MD5d2c3d745e2a7df34d739d6b55df2352f
SHA153de909f04f74522f5a6f71414e4aab74076fea4
SHA256514ad54e88c8d12db28c42224a141645693e8164ddc66ad59d0d9b4960167cf2
SHA51265253bed0113027901f838bcc189067ccb5b41c3d7c304bd3904fadd5d7921b2fd5931dcd2972122269384bae5e5f8bbb7bb35afcff288d1a4210e2d8ecd4dff