Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 01:45
Static task
static1
Behavioral task
behavioral1
Sample
481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
Resource
win7-20240903-en
General
-
Target
481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
-
Size
96KB
-
MD5
e33561a5d465e9efe456d20a8c0e24bd
-
SHA1
1aa6e4583896e70a1dd33e603f6e46308a050913
-
SHA256
481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4
-
SHA512
097dcc25e348a1fb5857e14e4097301893dc2c4f47d8e9f63e216710fb916b3d035a2c0f233fd219235fd59afb9d2d774cbe4827b4d71fa23e5962d7f24d6d63
-
SSDEEP
1536:ynAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxJ:yGs8cd8eXlYairZYqMddH13J
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1744 omsecor.exe 3456 omsecor.exe 4192 omsecor.exe 2496 omsecor.exe 4700 omsecor.exe 3032 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1624 set thread context of 3736 1624 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 81 PID 1744 set thread context of 3456 1744 omsecor.exe 86 PID 4192 set thread context of 2496 4192 omsecor.exe 100 PID 4700 set thread context of 3032 4700 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 428 1624 WerFault.exe 80 2236 1744 WerFault.exe 84 4484 4192 WerFault.exe 99 244 4700 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3736 1624 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 81 PID 1624 wrote to memory of 3736 1624 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 81 PID 1624 wrote to memory of 3736 1624 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 81 PID 1624 wrote to memory of 3736 1624 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 81 PID 1624 wrote to memory of 3736 1624 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 81 PID 3736 wrote to memory of 1744 3736 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 84 PID 3736 wrote to memory of 1744 3736 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 84 PID 3736 wrote to memory of 1744 3736 481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe 84 PID 1744 wrote to memory of 3456 1744 omsecor.exe 86 PID 1744 wrote to memory of 3456 1744 omsecor.exe 86 PID 1744 wrote to memory of 3456 1744 omsecor.exe 86 PID 1744 wrote to memory of 3456 1744 omsecor.exe 86 PID 1744 wrote to memory of 3456 1744 omsecor.exe 86 PID 3456 wrote to memory of 4192 3456 omsecor.exe 99 PID 3456 wrote to memory of 4192 3456 omsecor.exe 99 PID 3456 wrote to memory of 4192 3456 omsecor.exe 99 PID 4192 wrote to memory of 2496 4192 omsecor.exe 100 PID 4192 wrote to memory of 2496 4192 omsecor.exe 100 PID 4192 wrote to memory of 2496 4192 omsecor.exe 100 PID 4192 wrote to memory of 2496 4192 omsecor.exe 100 PID 4192 wrote to memory of 2496 4192 omsecor.exe 100 PID 2496 wrote to memory of 4700 2496 omsecor.exe 102 PID 2496 wrote to memory of 4700 2496 omsecor.exe 102 PID 2496 wrote to memory of 4700 2496 omsecor.exe 102 PID 4700 wrote to memory of 3032 4700 omsecor.exe 104 PID 4700 wrote to memory of 3032 4700 omsecor.exe 104 PID 4700 wrote to memory of 3032 4700 omsecor.exe 104 PID 4700 wrote to memory of 3032 4700 omsecor.exe 104 PID 4700 wrote to memory of 3032 4700 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe"C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exeC:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 2448⤵
- Program crash
PID:244
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 2926⤵
- Program crash
PID:4484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2884⤵
- Program crash
PID:2236
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 3042⤵
- Program crash
PID:428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1624 -ip 16241⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1744 -ip 17441⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4192 -ip 41921⤵PID:1104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4700 -ip 47001⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5be17593cc52f2fa0265fbfde1303b699
SHA10e87e73ff83f5adcce7ac91f55c20dacf0da4db1
SHA256586debc60776268da076a9be34efe8ce486e372032f2ab213f44270925a1f25c
SHA512dfc3e9788b0256f6de849093d5c0e27624bd6880681d8b7f2befaf971391da4ffa82d5aa07f3653e88df2b86ee46eca8de7631f25b36252203c407c595162320
-
Filesize
96KB
MD53c5d6230f85d3bd9cf32bd465c3463ff
SHA18bec94428b67ff1c8efcda13c83ea454a208f057
SHA2563e0254282f6415bd9e3329007f2ea13083367f0b382bcb03b2c827128eef2e07
SHA512d42b16b679f0208ab06779b6bc7a5ddc26a485be0bb9b68b67117557abea5125e004e35e69bee0051ba7046a77564eda44e1e25c3a408715a734d65f6bcde2b3
-
Filesize
96KB
MD51231ac8a9424a9100acfb8519b64aae7
SHA16c231538f9615514a184a1f41719d55645156c01
SHA2568670d2301d4c5f2de0508f21a2cd2e994bf8fe7dcf70cb35d887318b3a17cd09
SHA5127c5afdd3a5519f8e128ae5c5d6c244cad321b73c69976f533b836811d5d8767c361a2eb2ee71daef4a1910e31c559ce78ba75c8cf78037bd7bc27adcfed73a2b