Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 04:32
Static task
static1
Behavioral task
behavioral1
Sample
86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe
Resource
win7-20240903-en
General
-
Target
86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe
-
Size
96KB
-
MD5
07fbed2884abf65aa0130d7b72c8650c
-
SHA1
66c0e7809a326272f8a5ff74bbe37a9538d1730f
-
SHA256
86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a
-
SHA512
7a4a2e6448756ff14d5643ae020635f2212975cf45c0ef593d97e271d98aa69eac3fde9680caff2ac271346fc13e395af8bd178a5a1e9bf2fcb42b84b889e13a
-
SSDEEP
1536:BnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxD:BGs8cd8eXlYairZYqMddH13D
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2176 omsecor.exe 3824 omsecor.exe 3660 omsecor.exe 1512 omsecor.exe 4316 omsecor.exe 1032 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1224 set thread context of 680 1224 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 81 PID 2176 set thread context of 3824 2176 omsecor.exe 85 PID 3660 set thread context of 1512 3660 omsecor.exe 100 PID 4316 set thread context of 1032 4316 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3952 1224 WerFault.exe 80 4152 2176 WerFault.exe 83 2332 3660 WerFault.exe 99 4596 4316 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1224 wrote to memory of 680 1224 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 81 PID 1224 wrote to memory of 680 1224 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 81 PID 1224 wrote to memory of 680 1224 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 81 PID 1224 wrote to memory of 680 1224 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 81 PID 1224 wrote to memory of 680 1224 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 81 PID 680 wrote to memory of 2176 680 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 83 PID 680 wrote to memory of 2176 680 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 83 PID 680 wrote to memory of 2176 680 86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe 83 PID 2176 wrote to memory of 3824 2176 omsecor.exe 85 PID 2176 wrote to memory of 3824 2176 omsecor.exe 85 PID 2176 wrote to memory of 3824 2176 omsecor.exe 85 PID 2176 wrote to memory of 3824 2176 omsecor.exe 85 PID 2176 wrote to memory of 3824 2176 omsecor.exe 85 PID 3824 wrote to memory of 3660 3824 omsecor.exe 99 PID 3824 wrote to memory of 3660 3824 omsecor.exe 99 PID 3824 wrote to memory of 3660 3824 omsecor.exe 99 PID 3660 wrote to memory of 1512 3660 omsecor.exe 100 PID 3660 wrote to memory of 1512 3660 omsecor.exe 100 PID 3660 wrote to memory of 1512 3660 omsecor.exe 100 PID 3660 wrote to memory of 1512 3660 omsecor.exe 100 PID 3660 wrote to memory of 1512 3660 omsecor.exe 100 PID 1512 wrote to memory of 4316 1512 omsecor.exe 102 PID 1512 wrote to memory of 4316 1512 omsecor.exe 102 PID 1512 wrote to memory of 4316 1512 omsecor.exe 102 PID 4316 wrote to memory of 1032 4316 omsecor.exe 104 PID 4316 wrote to memory of 1032 4316 omsecor.exe 104 PID 4316 wrote to memory of 1032 4316 omsecor.exe 104 PID 4316 wrote to memory of 1032 4316 omsecor.exe 104 PID 4316 wrote to memory of 1032 4316 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe"C:\Users\Admin\AppData\Local\Temp\86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exeC:\Users\Admin\AppData\Local\Temp\86e798dffc69b395c3252b485ffbdb1ca77749bc1c02e2ae2c2f40c7192c8b7a.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 2568⤵
- Program crash
PID:4596
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 2926⤵
- Program crash
PID:2332
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2884⤵
- Program crash
PID:4152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 3002⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1224 -ip 12241⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2176 -ip 21761⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3660 -ip 36601⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4316 -ip 43161⤵PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a88af74ad7ecc46e3387212574a6d923
SHA1180bf8614a675c1212997d4a43dd6b8344a0879a
SHA256d36f827d867af8635da85a8afe1bb23e3d328ccaab439134255e83d5d5ccfa3b
SHA512fe697b270183cbfd5ed6d2cadd5c68310c4b248cd4bccf64b7b87957cbb1ad9eae4c1858fd534a337347f5c088671c1ab072067a999e6e9f836fc1210d3efc08
-
Filesize
96KB
MD58fe9b7e0d174a569c08c02971c3c112d
SHA18844f29291703647e2a7152a3ef385ebfd02da91
SHA2569bbd451eb2534b3a101ab5b47ad7db6f6b6a14f9a890f8724ced29223cd7c30d
SHA512fe5d37c06983142eab8551b66ec8cad9f2892921dc3c5184fa7ab7841bcf3c680492a2439090d0546a384c0c577e03c593342407fe8c37f927684e75306f3f02
-
Filesize
96KB
MD51639601291c4785027e7ea3aacd5a160
SHA1ecb558d827f004b8c83d0c635af8aea7a998fa4b
SHA256e452494779eb36dc45388ce0838e16b1de2b6c46c67abfe10581288a4305a7ba
SHA51219261621ab1c95c3fdc72ffbc2160763bef0dffec4c5fadc98161d5917f7ca7fe0d97b751df74b87849bf3316b2e43d3fe9771dd5ef433cbd0acba8051f5485a