Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 09:10
Static task
static1
Behavioral task
behavioral1
Sample
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
Resource
win7-20240903-en
General
-
Target
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
-
Size
96KB
-
MD5
c76ae9d599a9785e771abf4f29ceecfb
-
SHA1
5081943f7567b15af6bd451e27ce37b46b2b3908
-
SHA256
4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47
-
SHA512
0e747cf070e24c6d8a509079f7dd33c3ec9175a6c3df13e038a30a7b90daf56c3b40497b1f0ec0970818ba56d76bf9df65c5ce86f0eeb71eb6514b1b41c31ad7
-
SSDEEP
1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:jGs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2784 omsecor.exe 4236 omsecor.exe 3948 omsecor.exe 1404 omsecor.exe 1656 omsecor.exe 4964 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4140 set thread context of 3908 4140 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 82 PID 2784 set thread context of 4236 2784 omsecor.exe 86 PID 3948 set thread context of 1404 3948 omsecor.exe 100 PID 1656 set thread context of 4964 1656 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4392 2784 WerFault.exe 84 3184 4140 WerFault.exe 81 2972 3948 WerFault.exe 99 952 1656 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4140 wrote to memory of 3908 4140 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 82 PID 4140 wrote to memory of 3908 4140 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 82 PID 4140 wrote to memory of 3908 4140 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 82 PID 4140 wrote to memory of 3908 4140 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 82 PID 4140 wrote to memory of 3908 4140 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 82 PID 3908 wrote to memory of 2784 3908 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 84 PID 3908 wrote to memory of 2784 3908 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 84 PID 3908 wrote to memory of 2784 3908 4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe 84 PID 2784 wrote to memory of 4236 2784 omsecor.exe 86 PID 2784 wrote to memory of 4236 2784 omsecor.exe 86 PID 2784 wrote to memory of 4236 2784 omsecor.exe 86 PID 2784 wrote to memory of 4236 2784 omsecor.exe 86 PID 2784 wrote to memory of 4236 2784 omsecor.exe 86 PID 4236 wrote to memory of 3948 4236 omsecor.exe 99 PID 4236 wrote to memory of 3948 4236 omsecor.exe 99 PID 4236 wrote to memory of 3948 4236 omsecor.exe 99 PID 3948 wrote to memory of 1404 3948 omsecor.exe 100 PID 3948 wrote to memory of 1404 3948 omsecor.exe 100 PID 3948 wrote to memory of 1404 3948 omsecor.exe 100 PID 3948 wrote to memory of 1404 3948 omsecor.exe 100 PID 3948 wrote to memory of 1404 3948 omsecor.exe 100 PID 1404 wrote to memory of 1656 1404 omsecor.exe 102 PID 1404 wrote to memory of 1656 1404 omsecor.exe 102 PID 1404 wrote to memory of 1656 1404 omsecor.exe 102 PID 1656 wrote to memory of 4964 1656 omsecor.exe 104 PID 1656 wrote to memory of 4964 1656 omsecor.exe 104 PID 1656 wrote to memory of 4964 1656 omsecor.exe 104 PID 1656 wrote to memory of 4964 1656 omsecor.exe 104 PID 1656 wrote to memory of 4964 1656 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe"C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exeC:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 2448⤵
- Program crash
PID:952
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 3006⤵
- Program crash
PID:2972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 2884⤵
- Program crash
PID:4392
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 2762⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4140 -ip 41401⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2784 -ip 27841⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3948 -ip 39481⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1656 -ip 16561⤵PID:4004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d977eb153d2981b0ab3d968a5c62662b
SHA12a8866685a3f9c179002fb36ab21f3d2a2a70598
SHA256358c49f4dd479d458ad562dd0b29ebd836600fb9e00b3bd85f44a13b08885d5d
SHA512db5e5996781cd8f09beae46e37b064233461802150a87d1425b9e0e364132eb8515b8a45d47984cad1a7eb511dd07d663b2f92c11a1261d4d2999a77e3c88ef1
-
Filesize
96KB
MD5ff0a66d0ab28d44b16d0f46ac6d21dce
SHA16fce2a89f4e37ba34a24902f12450ef1a08c81bf
SHA2567f793f841df69ae717b8d3693bfcc430fd9ed036b0adf08ad80b2cfe5ab0f081
SHA512ec63375dc7584e774f5b95b25a12ecae1970126579e98b8f82ffded598edb06f83d76312658b79d72a7e7cd9ff0d68427c9ab7f8a7301ad33925c99d7c96d1c9
-
Filesize
96KB
MD50d947be482c8ae220190ba4c1122153b
SHA166e389ebda838b74a2d8c235db23cc6678c6f046
SHA256ae41dbd4503c452521322d318e2fc90f0bd995afb44bbadc7a5e792a54968abd
SHA512adfb0fc976dd9d4de197b2fabe57be5e532b8c37284dea48b7c1617caf64026de93c14c48a40b42ab515dd0717bbbc0328ac0d4510da89260cdf3b03ff807075