Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 04:08
Static task
static1
Behavioral task
behavioral1
Sample
27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe
Resource
win7-20240903-en
General
-
Target
27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe
-
Size
96KB
-
MD5
1c75638f6c6c6644ba830fdbd06cbedc
-
SHA1
2bd3ae1f289ec8aeb9591fbe4a6a9b2f0460899a
-
SHA256
27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75
-
SHA512
f978b7e39863cb51f3c4f53c0a5ad9089695fa8a6d59ccb3511a5c159f9f5e1eb4c4c950c7de797976f16da55a0f57ee3da278664c53fbb698bb151f63239267
-
SSDEEP
1536:SnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxT:SGs8cd8eXlYairZYqMddH13T
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2388 omsecor.exe 4136 omsecor.exe 1736 omsecor.exe 1660 omsecor.exe 452 omsecor.exe 3184 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4744 set thread context of 4568 4744 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 82 PID 2388 set thread context of 4136 2388 omsecor.exe 86 PID 1736 set thread context of 1660 1736 omsecor.exe 100 PID 452 set thread context of 3184 452 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4196 4744 WerFault.exe 81 4760 2388 WerFault.exe 84 100 1736 WerFault.exe 99 4336 452 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4568 4744 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 82 PID 4744 wrote to memory of 4568 4744 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 82 PID 4744 wrote to memory of 4568 4744 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 82 PID 4744 wrote to memory of 4568 4744 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 82 PID 4744 wrote to memory of 4568 4744 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 82 PID 4568 wrote to memory of 2388 4568 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 84 PID 4568 wrote to memory of 2388 4568 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 84 PID 4568 wrote to memory of 2388 4568 27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe 84 PID 2388 wrote to memory of 4136 2388 omsecor.exe 86 PID 2388 wrote to memory of 4136 2388 omsecor.exe 86 PID 2388 wrote to memory of 4136 2388 omsecor.exe 86 PID 2388 wrote to memory of 4136 2388 omsecor.exe 86 PID 2388 wrote to memory of 4136 2388 omsecor.exe 86 PID 4136 wrote to memory of 1736 4136 omsecor.exe 99 PID 4136 wrote to memory of 1736 4136 omsecor.exe 99 PID 4136 wrote to memory of 1736 4136 omsecor.exe 99 PID 1736 wrote to memory of 1660 1736 omsecor.exe 100 PID 1736 wrote to memory of 1660 1736 omsecor.exe 100 PID 1736 wrote to memory of 1660 1736 omsecor.exe 100 PID 1736 wrote to memory of 1660 1736 omsecor.exe 100 PID 1736 wrote to memory of 1660 1736 omsecor.exe 100 PID 1660 wrote to memory of 452 1660 omsecor.exe 102 PID 1660 wrote to memory of 452 1660 omsecor.exe 102 PID 1660 wrote to memory of 452 1660 omsecor.exe 102 PID 452 wrote to memory of 3184 452 omsecor.exe 104 PID 452 wrote to memory of 3184 452 omsecor.exe 104 PID 452 wrote to memory of 3184 452 omsecor.exe 104 PID 452 wrote to memory of 3184 452 omsecor.exe 104 PID 452 wrote to memory of 3184 452 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe"C:\Users\Admin\AppData\Local\Temp\27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exeC:\Users\Admin\AppData\Local\Temp\27ae1e500004745b35b8164abe5fad810f82908ab5b44ba92ce0f7bfeaaaec75.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 2568⤵
- Program crash
PID:4336
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 2926⤵
- Program crash
PID:100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 2884⤵
- Program crash
PID:4760
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 2882⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4744 -ip 47441⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2388 -ip 23881⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1736 -ip 17361⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 452 -ip 4521⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c8a206a7b83e88a1945bda40013f6cce
SHA1785216162e0e4f3c14f396d95777a72ad8cb2a42
SHA2560caf141d7b9a666365c56bbbcc8e530e63d547b5afe4927ee7603b0aaf2e0629
SHA51256cd1660ef76732c8747f7396043009921b132c7aa62001711f2d6d856b923422f540bbd0f2f6e0e48a5f07b993d65078980905efda1d5a70903b85879382abd
-
Filesize
96KB
MD536fd7aa8ea8794b2b6b81a47f6ed8f5e
SHA1ce0eeedcfddd361bde59422ae357bfa0fd7695e8
SHA256642d97c675e5aed6be6474621a97a85141130eb1d93c38fe42e600eb02521fa3
SHA51269f4110f90e295f0523e4d888aa6cf109b4677fcb00bd1bd2293dd4b7503e6c58a56684218fc8d4d8077b68fc454274efb0126d21017dba02ab1558ce8c1dc74
-
Filesize
96KB
MD55d6314bcabe91de5f8abda40a6e9b9c7
SHA1b1de3d3d52b7ce23efcccf5b1d41ccab32a87023
SHA2562379fec24d29dbd7ecf00812b64d642364c208ed8034d830ed28ee7a8d17a110
SHA512fd0f32fbfaaffe99fcfe2ce570ec88a8d92da549d6a622accf39664a05457f76d0609f5bd0e192220b4b2238cd1e5df10d31bcae136da36aefaf5f6e85562081