Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 08:34
Static task
static1
Behavioral task
behavioral1
Sample
cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe
Resource
win7-20241010-en
General
-
Target
cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe
-
Size
96KB
-
MD5
855d8b68a2b217f91ad08aa09042fb66
-
SHA1
41a47e4d760a72d82cd8796b905d6a51a19473f4
-
SHA256
cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc
-
SHA512
769515bab20beb3b98b11bc054caad6094570ee5607ac80e648d713f9a2a15b59830f298e84abf2ee4cfd605cfcc21665af4137eabb8e8945bbfb159b7c89452
-
SSDEEP
1536:KnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:KGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1332 omsecor.exe 2516 omsecor.exe 5100 omsecor.exe 2576 omsecor.exe 676 omsecor.exe 4420 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1404 set thread context of 3776 1404 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 83 PID 1332 set thread context of 2516 1332 omsecor.exe 88 PID 5100 set thread context of 2576 5100 omsecor.exe 108 PID 676 set thread context of 4420 676 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 2892 1404 WerFault.exe 82 1388 1332 WerFault.exe 85 4324 5100 WerFault.exe 107 3304 676 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1404 wrote to memory of 3776 1404 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 83 PID 1404 wrote to memory of 3776 1404 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 83 PID 1404 wrote to memory of 3776 1404 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 83 PID 1404 wrote to memory of 3776 1404 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 83 PID 1404 wrote to memory of 3776 1404 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 83 PID 3776 wrote to memory of 1332 3776 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 85 PID 3776 wrote to memory of 1332 3776 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 85 PID 3776 wrote to memory of 1332 3776 cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe 85 PID 1332 wrote to memory of 2516 1332 omsecor.exe 88 PID 1332 wrote to memory of 2516 1332 omsecor.exe 88 PID 1332 wrote to memory of 2516 1332 omsecor.exe 88 PID 1332 wrote to memory of 2516 1332 omsecor.exe 88 PID 1332 wrote to memory of 2516 1332 omsecor.exe 88 PID 2516 wrote to memory of 5100 2516 omsecor.exe 107 PID 2516 wrote to memory of 5100 2516 omsecor.exe 107 PID 2516 wrote to memory of 5100 2516 omsecor.exe 107 PID 5100 wrote to memory of 2576 5100 omsecor.exe 108 PID 5100 wrote to memory of 2576 5100 omsecor.exe 108 PID 5100 wrote to memory of 2576 5100 omsecor.exe 108 PID 5100 wrote to memory of 2576 5100 omsecor.exe 108 PID 5100 wrote to memory of 2576 5100 omsecor.exe 108 PID 2576 wrote to memory of 676 2576 omsecor.exe 110 PID 2576 wrote to memory of 676 2576 omsecor.exe 110 PID 2576 wrote to memory of 676 2576 omsecor.exe 110 PID 676 wrote to memory of 4420 676 omsecor.exe 111 PID 676 wrote to memory of 4420 676 omsecor.exe 111 PID 676 wrote to memory of 4420 676 omsecor.exe 111 PID 676 wrote to memory of 4420 676 omsecor.exe 111 PID 676 wrote to memory of 4420 676 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe"C:\Users\Admin\AppData\Local\Temp\cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exeC:\Users\Admin\AppData\Local\Temp\cdb901c7462da55aa2bde2ecc1b2f416c9b99a8702957e52d197fd9fcd22f3dc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 676 -s 2688⤵
- Program crash
PID:3304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 2926⤵
- Program crash
PID:4324
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 2884⤵
- Program crash
PID:1388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 3002⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1404 -ip 14041⤵PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1332 -ip 13321⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5100 -ip 51001⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 676 -ip 6761⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ed997794286740c15e750d9c55b9186e
SHA1714d218f371f506a9dd7aedc797afd6ba0c4f058
SHA256ea925efaf20bffce3d9f24f67d7c3ac968930f817987db6ab5839f1799dc9965
SHA512ac85339e11613dc75f36838f671629e322417f7e00c3edd8604e0614e010e9acddcf15425c3dc44ac2b5c0e88b2620ed0ecc397c553f0126db7a6df7c0be94a2
-
Filesize
96KB
MD5ce9032a4205c7b4840ff76b57d05246f
SHA15c315a171255093e3522f6f7ade94f32353cc6a9
SHA256d9e10a41eeffb526ad276a1a65e4f1f5deffda51ced91757a348f4f936ae4206
SHA512b9f1f5b41ede2c93d823bfa1795a91c762f9069c817fe1ca6a85765b839f0a7d567a8d1a68ca6783059d197d40b2fd5c46048066bcc7499af69a643aac8e33ce
-
Filesize
96KB
MD593dae3648185c95b56a33afed315d820
SHA1239294f6f43fc840c0f1a79f13aa8ebddc8a538c
SHA2562827ae22249ec7be8fe2cac4f380ef51806c4f914835a8a07411682612cb5cf7
SHA512ecb03c775147cd01db3a47334da033b7c74ffb90943776193bc6f3396fc4df281ecfb738fad7fe72ccdf60abc4b78f379dcb806a7adaaa630ce84fc92f13a2fe