Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 15:51
Static task
static1
Behavioral task
behavioral1
Sample
5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe
Resource
win7-20240903-en
General
-
Target
5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe
-
Size
96KB
-
MD5
e23e1066967cfe27f0bad4cbab114e0e
-
SHA1
7f4af7f5b9c2021c553d4bec0915f1ab56c2630b
-
SHA256
5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d
-
SHA512
2f5741e0fe892e064024a84b03b9973550dfd86ab1df591f6ad11a6ff25c7333967f8c49b97362998d5ee77b0ec781bdfbada240c1d4f59c5af0ba01f89fe645
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxT:EGs8cd8eXlYairZYqMddH13T
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3808 omsecor.exe 2424 omsecor.exe 2644 omsecor.exe 4252 omsecor.exe 3996 omsecor.exe 1860 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2728 set thread context of 516 2728 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 82 PID 3808 set thread context of 2424 3808 omsecor.exe 87 PID 2644 set thread context of 4252 2644 omsecor.exe 100 PID 3996 set thread context of 1860 3996 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 2564 2728 WerFault.exe 81 4192 3808 WerFault.exe 84 2524 2644 WerFault.exe 99 2832 3996 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2728 wrote to memory of 516 2728 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 82 PID 2728 wrote to memory of 516 2728 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 82 PID 2728 wrote to memory of 516 2728 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 82 PID 2728 wrote to memory of 516 2728 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 82 PID 2728 wrote to memory of 516 2728 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 82 PID 516 wrote to memory of 3808 516 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 84 PID 516 wrote to memory of 3808 516 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 84 PID 516 wrote to memory of 3808 516 5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe 84 PID 3808 wrote to memory of 2424 3808 omsecor.exe 87 PID 3808 wrote to memory of 2424 3808 omsecor.exe 87 PID 3808 wrote to memory of 2424 3808 omsecor.exe 87 PID 3808 wrote to memory of 2424 3808 omsecor.exe 87 PID 3808 wrote to memory of 2424 3808 omsecor.exe 87 PID 2424 wrote to memory of 2644 2424 omsecor.exe 99 PID 2424 wrote to memory of 2644 2424 omsecor.exe 99 PID 2424 wrote to memory of 2644 2424 omsecor.exe 99 PID 2644 wrote to memory of 4252 2644 omsecor.exe 100 PID 2644 wrote to memory of 4252 2644 omsecor.exe 100 PID 2644 wrote to memory of 4252 2644 omsecor.exe 100 PID 2644 wrote to memory of 4252 2644 omsecor.exe 100 PID 2644 wrote to memory of 4252 2644 omsecor.exe 100 PID 4252 wrote to memory of 3996 4252 omsecor.exe 102 PID 4252 wrote to memory of 3996 4252 omsecor.exe 102 PID 4252 wrote to memory of 3996 4252 omsecor.exe 102 PID 3996 wrote to memory of 1860 3996 omsecor.exe 103 PID 3996 wrote to memory of 1860 3996 omsecor.exe 103 PID 3996 wrote to memory of 1860 3996 omsecor.exe 103 PID 3996 wrote to memory of 1860 3996 omsecor.exe 103 PID 3996 wrote to memory of 1860 3996 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe"C:\Users\Admin\AppData\Local\Temp\5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exeC:\Users\Admin\AppData\Local\Temp\5f23a18472141c4108d7cd49ebaa3f58fa3006777922b737202cf7338c8e0d0d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 2568⤵
- Program crash
PID:2832
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 2926⤵
- Program crash
PID:2524
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 2884⤵
- Program crash
PID:4192
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 2922⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2728 -ip 27281⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3808 -ip 38081⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2644 -ip 26441⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3996 -ip 39961⤵PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD536a38bb1103bd2df6c4b964957060172
SHA1514730188ab2aded1874826a653dc51ad7093da7
SHA256e1320d244ff643d05258a8612d70e18d32a4b3ed5b2f1e50220c245b44d1ad5c
SHA512c445c6314d6c98a1909222927bb6d117c1ca18ee088e9af38c578c9161e5b532e4612f187c11d4a9ebab61456437b5268587bd1662125beba47c5b798f57f3a0
-
Filesize
96KB
MD548ebb298181ab30c984aede914af5c85
SHA151193285d5ce7d982535063fa5c70941e14ab5f5
SHA2564e46ccb6b95b9d2c36740e1e4034e7eecfdb4febd1709f909c26a37d43a01d14
SHA5122e49a8bb05fa159067a98574db812a80247fccc0e7d43c515a249867553d7343c1fe87e6801c70be77f47717e6533e9da04ceb757369eb7af3f5caaea37896af
-
Filesize
96KB
MD549ca5941d55b7b3dd9a7c7cc25ae8289
SHA10d6df3e418d39a9acab8e86ed97dc0fa19908d95
SHA2560c4abc65b498424b88a66988f940a871380baaec7a44ecbb2aadd0f24dce0f5f
SHA5121a83a6f1ad06ffb39cccce832d7b2f1379fd80f05ef2da512e0d215ec04190a8ba6546d85a1046b601b9ddfefb4f83544146ce9608f4c1f529c8d3b9b7fafba1