Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 15:19
Static task
static1
Behavioral task
behavioral1
Sample
647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe
Resource
win7-20241010-en
General
-
Target
647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe
-
Size
96KB
-
MD5
cb89fabf46dead53d02318d1f5ff7060
-
SHA1
f54c253780c05f55b093391bf5ae8f7c977ecaa8
-
SHA256
647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917
-
SHA512
c8bab8add53a24ccdae937c1282dd8f1e4a7bdef5477f1b01adcd2e72add5ef5b03f04675e53a0a0ecbfb371a521ae012bf94bd9eb2152c41049b4adec507bc6
-
SSDEEP
1536:fnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:fGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1708 omsecor.exe 4484 omsecor.exe 448 omsecor.exe 4360 omsecor.exe 1064 omsecor.exe 2444 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4616 set thread context of 884 4616 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 82 PID 1708 set thread context of 4484 1708 omsecor.exe 87 PID 448 set thread context of 4360 448 omsecor.exe 100 PID 1064 set thread context of 2444 1064 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3336 4616 WerFault.exe 81 688 1708 WerFault.exe 85 5032 448 WerFault.exe 99 2112 1064 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4616 wrote to memory of 884 4616 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 82 PID 4616 wrote to memory of 884 4616 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 82 PID 4616 wrote to memory of 884 4616 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 82 PID 4616 wrote to memory of 884 4616 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 82 PID 4616 wrote to memory of 884 4616 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 82 PID 884 wrote to memory of 1708 884 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 85 PID 884 wrote to memory of 1708 884 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 85 PID 884 wrote to memory of 1708 884 647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe 85 PID 1708 wrote to memory of 4484 1708 omsecor.exe 87 PID 1708 wrote to memory of 4484 1708 omsecor.exe 87 PID 1708 wrote to memory of 4484 1708 omsecor.exe 87 PID 1708 wrote to memory of 4484 1708 omsecor.exe 87 PID 1708 wrote to memory of 4484 1708 omsecor.exe 87 PID 4484 wrote to memory of 448 4484 omsecor.exe 99 PID 4484 wrote to memory of 448 4484 omsecor.exe 99 PID 4484 wrote to memory of 448 4484 omsecor.exe 99 PID 448 wrote to memory of 4360 448 omsecor.exe 100 PID 448 wrote to memory of 4360 448 omsecor.exe 100 PID 448 wrote to memory of 4360 448 omsecor.exe 100 PID 448 wrote to memory of 4360 448 omsecor.exe 100 PID 448 wrote to memory of 4360 448 omsecor.exe 100 PID 4360 wrote to memory of 1064 4360 omsecor.exe 102 PID 4360 wrote to memory of 1064 4360 omsecor.exe 102 PID 4360 wrote to memory of 1064 4360 omsecor.exe 102 PID 1064 wrote to memory of 2444 1064 omsecor.exe 104 PID 1064 wrote to memory of 2444 1064 omsecor.exe 104 PID 1064 wrote to memory of 2444 1064 omsecor.exe 104 PID 1064 wrote to memory of 2444 1064 omsecor.exe 104 PID 1064 wrote to memory of 2444 1064 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe"C:\Users\Admin\AppData\Local\Temp\647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exeC:\Users\Admin\AppData\Local\Temp\647c27729b0c7c233098badffddc9e0fcf375d4ae9130800107613d1f3672917.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1064 -s 2408⤵
- Program crash
PID:2112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 2966⤵
- Program crash
PID:5032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 2884⤵
- Program crash
PID:688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 2882⤵
- Program crash
PID:3336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4616 -ip 46161⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1708 -ip 17081⤵PID:2576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 448 -ip 4481⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1064 -ip 10641⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD564046680728f08c96bb3a88e24f3123d
SHA15edc2a556d142a666996006edc307e69f3024310
SHA256630fa7a63a4e33c336b95e5084438087c785f68d716346b36fe5a6bad3da979d
SHA512387106688f622bfafa6c68cb5471532c53d8a4e60fc5be66bd5138a4d833d3a8a0457991ce494cb6e2d639085bb3da33d1cf356df97f28e7e2a3a48f7e2d7fe1
-
Filesize
96KB
MD5d458833caeda2ec19cb80eb10e378062
SHA1f3bf4948fc59b415d501a1869a2ba8c8085e2a40
SHA25698b322fd7d9176551e8fc07155e6d41a7f02c0bbf860a833b567553dad339640
SHA512e432c253a690f4a1cc8ddec9abbbcad38b7af0fcff2e61d9a648d4c2e3217a60c57299b14edda358c10cdb4f337d5f8ebb80897300e3be22c40364e4d77a4147
-
Filesize
96KB
MD5c756e7ae65e96ad4eee3259aa8b3498c
SHA174e07f8a9e444503eb8b3ce8d0d7e66ea6acd666
SHA256eaa8e1b853f9b60a2a68f0f54d4555d56fb7085020499e74696cf04788918a6e
SHA512e7d8ba718f96318072247afbb64bbe429b0c827c1f8451179d5f351db14b569e2a586cfa8e85b91e16cde6ea3687446c46e3439142797b92afb9a2f14fe96bfe