Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 12:50
Static task
static1
Behavioral task
behavioral1
Sample
2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe
Resource
win7-20240903-en
General
-
Target
2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe
-
Size
134KB
-
MD5
ffd393c95099a09f7fa9e5af1071da2c
-
SHA1
4dce504ca96b683483bc13db23810c116142b8ea
-
SHA256
2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46
-
SHA512
5563c114746c8e4fb660f2c0f8f9f3355e19e22118df346b049c9f2387a390c2ec33defc2fcfcbbe94cb9c81045ba873df7c2196dbf4ee8dd0299f2cbec76b82
-
SSDEEP
1536:aDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiv:8iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4104 omsecor.exe 4704 omsecor.exe 1232 omsecor.exe 2280 omsecor.exe 1744 omsecor.exe 2736 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 372 set thread context of 3924 372 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 82 PID 4104 set thread context of 4704 4104 omsecor.exe 86 PID 1232 set thread context of 2280 1232 omsecor.exe 100 PID 1744 set thread context of 2736 1744 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2388 372 WerFault.exe 81 1072 4104 WerFault.exe 85 4248 1232 WerFault.exe 99 4788 1744 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 372 wrote to memory of 3924 372 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 82 PID 372 wrote to memory of 3924 372 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 82 PID 372 wrote to memory of 3924 372 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 82 PID 372 wrote to memory of 3924 372 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 82 PID 372 wrote to memory of 3924 372 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 82 PID 3924 wrote to memory of 4104 3924 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 85 PID 3924 wrote to memory of 4104 3924 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 85 PID 3924 wrote to memory of 4104 3924 2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe 85 PID 4104 wrote to memory of 4704 4104 omsecor.exe 86 PID 4104 wrote to memory of 4704 4104 omsecor.exe 86 PID 4104 wrote to memory of 4704 4104 omsecor.exe 86 PID 4104 wrote to memory of 4704 4104 omsecor.exe 86 PID 4104 wrote to memory of 4704 4104 omsecor.exe 86 PID 4704 wrote to memory of 1232 4704 omsecor.exe 99 PID 4704 wrote to memory of 1232 4704 omsecor.exe 99 PID 4704 wrote to memory of 1232 4704 omsecor.exe 99 PID 1232 wrote to memory of 2280 1232 omsecor.exe 100 PID 1232 wrote to memory of 2280 1232 omsecor.exe 100 PID 1232 wrote to memory of 2280 1232 omsecor.exe 100 PID 1232 wrote to memory of 2280 1232 omsecor.exe 100 PID 1232 wrote to memory of 2280 1232 omsecor.exe 100 PID 2280 wrote to memory of 1744 2280 omsecor.exe 102 PID 2280 wrote to memory of 1744 2280 omsecor.exe 102 PID 2280 wrote to memory of 1744 2280 omsecor.exe 102 PID 1744 wrote to memory of 2736 1744 omsecor.exe 104 PID 1744 wrote to memory of 2736 1744 omsecor.exe 104 PID 1744 wrote to memory of 2736 1744 omsecor.exe 104 PID 1744 wrote to memory of 2736 1744 omsecor.exe 104 PID 1744 wrote to memory of 2736 1744 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe"C:\Users\Admin\AppData\Local\Temp\2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exeC:\Users\Admin\AppData\Local\Temp\2a124582ada4abe496d54c706932bf89fc9e9834113fa33d076f987dfb756a46.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2568⤵
- Program crash
PID:4788
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 2926⤵
- Program crash
PID:4248
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 2884⤵
- Program crash
PID:1072
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 2882⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 372 -ip 3721⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4104 -ip 41041⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1232 -ip 12321⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1744 -ip 17441⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5d395b2d1a3ecb06d644ed974ab7c6bf4
SHA13510829f6732605dc38036021b1397eca83bb06c
SHA2569f695207272239069266539f970c86e69068971a205d16bc836f926059836f14
SHA5121c43f08caf3931731c7f00e410bbaf32eb6dfd956f1079488bc5b545c9b86fddc3d907ae749b3ab19d5ce0b2bcabffbea3dc0b0840f0d79bf2f36cfd9076127a
-
Filesize
134KB
MD5e39c759d06f52d4c0ed51fefebdc2342
SHA1a99877f6d34653c4163fdc5cede9b70e61f492f1
SHA256fa09cdfb7306cf78105dfc7eb06ae6969fe4770c5ef8e20a10cf646c2836ceb5
SHA51274e6ba03b811ccecec58a663e5178ef6d129d5efb1300f8eff91374575f8f4a042b9bbd22e3ec2c49930b1b11597a4524ccdab3f026317760e14db666888957e
-
Filesize
134KB
MD5e1bff33ad5f4cc4ec288a20e45e48285
SHA123d1093013eebeadb727427add793b3a2bca4ad8
SHA256fbc43190c460c5a9a9d176025843910cacd5dacd1afa817329595b97bc02d141
SHA51231bd31e13bfc456d45e9d2b58d784ae9dc5d686816bbc57a9c0dca81dedeb7b66b982a7109ef474f911205ad12c25a9f6c00481918330fffd3bdeb244e02b794