Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 02:54
Static task
static1
Behavioral task
behavioral1
Sample
7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe
Resource
win7-20240903-en
General
-
Target
7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe
-
Size
96KB
-
MD5
5ec2d98eed16ff460b007d4e1906b847
-
SHA1
083ea682b0221622e57184ba39a8a15477a426fd
-
SHA256
7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345
-
SHA512
65d570166147941bfb8a52c4f09c2502bb070b083b92d9177b7f1a5906da2a28197bdc31cc4bf7f9326ce68fd52e59c318191610829d0c29e610faeb3249a793
-
SSDEEP
1536:anAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:aGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1624 omsecor.exe 3868 omsecor.exe 1844 omsecor.exe 2708 omsecor.exe 4164 omsecor.exe 3660 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 956 set thread context of 2252 956 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 83 PID 1624 set thread context of 3868 1624 omsecor.exe 87 PID 1844 set thread context of 2708 1844 omsecor.exe 108 PID 4164 set thread context of 3660 4164 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 208 956 WerFault.exe 82 4104 1624 WerFault.exe 86 2920 1844 WerFault.exe 107 3580 4164 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 956 wrote to memory of 2252 956 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 83 PID 956 wrote to memory of 2252 956 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 83 PID 956 wrote to memory of 2252 956 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 83 PID 956 wrote to memory of 2252 956 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 83 PID 956 wrote to memory of 2252 956 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 83 PID 2252 wrote to memory of 1624 2252 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 86 PID 2252 wrote to memory of 1624 2252 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 86 PID 2252 wrote to memory of 1624 2252 7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe 86 PID 1624 wrote to memory of 3868 1624 omsecor.exe 87 PID 1624 wrote to memory of 3868 1624 omsecor.exe 87 PID 1624 wrote to memory of 3868 1624 omsecor.exe 87 PID 1624 wrote to memory of 3868 1624 omsecor.exe 87 PID 1624 wrote to memory of 3868 1624 omsecor.exe 87 PID 3868 wrote to memory of 1844 3868 omsecor.exe 107 PID 3868 wrote to memory of 1844 3868 omsecor.exe 107 PID 3868 wrote to memory of 1844 3868 omsecor.exe 107 PID 1844 wrote to memory of 2708 1844 omsecor.exe 108 PID 1844 wrote to memory of 2708 1844 omsecor.exe 108 PID 1844 wrote to memory of 2708 1844 omsecor.exe 108 PID 1844 wrote to memory of 2708 1844 omsecor.exe 108 PID 1844 wrote to memory of 2708 1844 omsecor.exe 108 PID 2708 wrote to memory of 4164 2708 omsecor.exe 110 PID 2708 wrote to memory of 4164 2708 omsecor.exe 110 PID 2708 wrote to memory of 4164 2708 omsecor.exe 110 PID 4164 wrote to memory of 3660 4164 omsecor.exe 112 PID 4164 wrote to memory of 3660 4164 omsecor.exe 112 PID 4164 wrote to memory of 3660 4164 omsecor.exe 112 PID 4164 wrote to memory of 3660 4164 omsecor.exe 112 PID 4164 wrote to memory of 3660 4164 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe"C:\Users\Admin\AppData\Local\Temp\7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exeC:\Users\Admin\AppData\Local\Temp\7c9813ba830d9f01d25baa6467f98c3e98efd009acbcc983605d471970259345.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 2688⤵
- Program crash
PID:3580
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 2926⤵
- Program crash
PID:2920
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 3004⤵
- Program crash
PID:4104
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 2882⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 956 -ip 9561⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1624 -ip 16241⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1844 -ip 18441⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4164 -ip 41641⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ad908e17e061ded9f12d02830d3ecbbe
SHA144d19444bd1702313000eb724bd6b9c3d94da3fc
SHA2564e1968602babfe29f878a900b6202d27e2f79f2e901dd808180da76b1dda430a
SHA512a91e32fda7e7813108a36da7eb7105b327f053e9968b59ecea53b391085570b1aab6db9798cf5fdda84060fc06770edd8e9703eaf546c7376588731abc29ba41
-
Filesize
96KB
MD523d1cf278ac56ac9435ba38ab08205bf
SHA188821ebd6beff95e06b8cdda9769a226792e12e7
SHA256f8ae97a2442f7a0d7c37b633de740a13ec45c0b06390080e85f34312e5377f28
SHA512458e47b01a62750aa97b1d163077695bd0b493f9674ebb2a3105b5c6b592f86fb80d0889e6b1402be57326fb084119b16ff66cc3bd1cb825a894ce4723d904ad
-
Filesize
96KB
MD5cf710602038515768248ddd707728d63
SHA14d1fb8a84726049c0872572d23fbf4bd39219399
SHA256f64c52e8b3d01e5b9a22387ec1ba8892d4b74c8e83fea9cd8a47b7f869b2884a
SHA5125fe63762ad3b62f26a02d371508405d762bcd4ce3d2a2bf878b9e6a7af17f3862717719d1c7ed97dc3a6240ffb864e87b3398ee6e52a54a70c679211a8c735cf