Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 05:05
Static task
static1
Behavioral task
behavioral1
Sample
f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe
Resource
win7-20240903-en
General
-
Target
f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe
-
Size
96KB
-
MD5
84bc7b538466daa41130d64f94c24b6c
-
SHA1
13213bd1cb2f5cf7121d3153daee1c65f7d747f8
-
SHA256
f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73
-
SHA512
ea7c84e7dda528c6176ad00b18f66ee93526709f37873ab3cfa6ef6fac50c6ab738318e3c3fd4cf4647f83121dc6fc836e520f74eb8c4f55af767c73236d855b
-
SSDEEP
1536:JnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:JGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4788 omsecor.exe 408 omsecor.exe 2596 omsecor.exe 2684 omsecor.exe 4672 omsecor.exe 3996 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1332 set thread context of 2148 1332 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 83 PID 4788 set thread context of 408 4788 omsecor.exe 87 PID 2596 set thread context of 2684 2596 omsecor.exe 110 PID 4672 set thread context of 3996 4672 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4204 1332 WerFault.exe 82 836 4788 WerFault.exe 85 3624 2596 WerFault.exe 109 4332 4672 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2148 1332 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 83 PID 1332 wrote to memory of 2148 1332 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 83 PID 1332 wrote to memory of 2148 1332 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 83 PID 1332 wrote to memory of 2148 1332 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 83 PID 1332 wrote to memory of 2148 1332 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 83 PID 2148 wrote to memory of 4788 2148 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 85 PID 2148 wrote to memory of 4788 2148 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 85 PID 2148 wrote to memory of 4788 2148 f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe 85 PID 4788 wrote to memory of 408 4788 omsecor.exe 87 PID 4788 wrote to memory of 408 4788 omsecor.exe 87 PID 4788 wrote to memory of 408 4788 omsecor.exe 87 PID 4788 wrote to memory of 408 4788 omsecor.exe 87 PID 4788 wrote to memory of 408 4788 omsecor.exe 87 PID 408 wrote to memory of 2596 408 omsecor.exe 109 PID 408 wrote to memory of 2596 408 omsecor.exe 109 PID 408 wrote to memory of 2596 408 omsecor.exe 109 PID 2596 wrote to memory of 2684 2596 omsecor.exe 110 PID 2596 wrote to memory of 2684 2596 omsecor.exe 110 PID 2596 wrote to memory of 2684 2596 omsecor.exe 110 PID 2596 wrote to memory of 2684 2596 omsecor.exe 110 PID 2596 wrote to memory of 2684 2596 omsecor.exe 110 PID 2684 wrote to memory of 4672 2684 omsecor.exe 112 PID 2684 wrote to memory of 4672 2684 omsecor.exe 112 PID 2684 wrote to memory of 4672 2684 omsecor.exe 112 PID 4672 wrote to memory of 3996 4672 omsecor.exe 113 PID 4672 wrote to memory of 3996 4672 omsecor.exe 113 PID 4672 wrote to memory of 3996 4672 omsecor.exe 113 PID 4672 wrote to memory of 3996 4672 omsecor.exe 113 PID 4672 wrote to memory of 3996 4672 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe"C:\Users\Admin\AppData\Local\Temp\f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exeC:\Users\Admin\AppData\Local\Temp\f4698649d50cc91b85dbe22e275884fbf5f7932033724674fa3ba4c704881f73.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 2568⤵
- Program crash
PID:4332
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 2966⤵
- Program crash
PID:3624
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 2884⤵
- Program crash
PID:836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 2882⤵
- Program crash
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1332 -ip 13321⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4788 -ip 47881⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2596 -ip 25961⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4672 -ip 46721⤵PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c28bd966c5a02baca0e63ced01259256
SHA1c902c697aaa93dc1243bf43ebc262817afa6e7ec
SHA2569d02eae7738a3f53f675c9fcc725d393dce69fb60c5b7e0315fd6f9d3866009f
SHA512575ac22de99a4019bc63d9bbb89a4dc7d2bc1a184b08a135d8b3f5f0f2096efaac4cc1c4feb84802f0c59291550cae143ce3457bad66409af69277ae4bb5dd19
-
Filesize
96KB
MD56b88477da2ee1c25d9d462f479bc88cd
SHA148a314b5fae77d1ad598f1ac9d30adcb7c7b87e8
SHA25670321bc3e4a455418cde306da4194b779c4c01a474bf1aec1eaaac2de64d1f77
SHA5128fcceec0bc07d1552e864d57373e466c1cee2288b9422acd0cb7efeca45bf0cb99e802f990c0eff73a37c2b62da0378d45252dad14a2e74d44f4c08383039613
-
Filesize
96KB
MD5995536b03bfe70ff35dc2ad06f7dd094
SHA16816fe0d5544fbd0f620c62af0bf8e5abfc2fea3
SHA25668119f45af9b3c74f3b7ba472120378ebd32192a8633d25b18ec8f54af3a3d1b
SHA512a1be0f8a35766575523b694b018abbdb25d1a7d70825b1ba26dad706bdd46d997e0b7b01e5c18f610b950d96984a04a7fd5764d82effcf7f7489a314125ff14c