Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 13:12
Static task
static1
Behavioral task
behavioral1
Sample
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe
Resource
win7-20241023-en
General
-
Target
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe
-
Size
96KB
-
MD5
640036c324b6763e3397bdc9d5065426
-
SHA1
cb5ef36508ef3ecd646a80375141bc7379677a7e
-
SHA256
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df
-
SHA512
e75a5e9d79d5df89f113a4d2ac5fba0d16dc201944e4dd0a6d440f4b569512dad11eaf57382569691aa307e8d85ce4acaf67c379a8524f20aa0ff319ee06cc35
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxp:MGs8cd8eXlYairZYqMddH13p
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2148 omsecor.exe 812 omsecor.exe 1596 omsecor.exe 4864 omsecor.exe 2448 omsecor.exe 4964 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4776 set thread context of 2312 4776 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 2148 set thread context of 812 2148 omsecor.exe 90 PID 1596 set thread context of 4864 1596 omsecor.exe 99 PID 2448 set thread context of 4964 2448 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 1600 4776 WerFault.exe 84 2016 2148 WerFault.exe 88 4168 1596 WerFault.exe 98 1832 2448 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2312 4776 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 4776 wrote to memory of 2312 4776 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 4776 wrote to memory of 2312 4776 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 4776 wrote to memory of 2312 4776 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 4776 wrote to memory of 2312 4776 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 2312 wrote to memory of 2148 2312 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 88 PID 2312 wrote to memory of 2148 2312 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 88 PID 2312 wrote to memory of 2148 2312 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 88 PID 2148 wrote to memory of 812 2148 omsecor.exe 90 PID 2148 wrote to memory of 812 2148 omsecor.exe 90 PID 2148 wrote to memory of 812 2148 omsecor.exe 90 PID 2148 wrote to memory of 812 2148 omsecor.exe 90 PID 2148 wrote to memory of 812 2148 omsecor.exe 90 PID 812 wrote to memory of 1596 812 omsecor.exe 98 PID 812 wrote to memory of 1596 812 omsecor.exe 98 PID 812 wrote to memory of 1596 812 omsecor.exe 98 PID 1596 wrote to memory of 4864 1596 omsecor.exe 99 PID 1596 wrote to memory of 4864 1596 omsecor.exe 99 PID 1596 wrote to memory of 4864 1596 omsecor.exe 99 PID 1596 wrote to memory of 4864 1596 omsecor.exe 99 PID 1596 wrote to memory of 4864 1596 omsecor.exe 99 PID 4864 wrote to memory of 2448 4864 omsecor.exe 101 PID 4864 wrote to memory of 2448 4864 omsecor.exe 101 PID 4864 wrote to memory of 2448 4864 omsecor.exe 101 PID 2448 wrote to memory of 4964 2448 omsecor.exe 103 PID 2448 wrote to memory of 4964 2448 omsecor.exe 103 PID 2448 wrote to memory of 4964 2448 omsecor.exe 103 PID 2448 wrote to memory of 4964 2448 omsecor.exe 103 PID 2448 wrote to memory of 4964 2448 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe"C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exeC:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 2608⤵
- Program crash
PID:1832
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 2926⤵
- Program crash
PID:4168
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 2884⤵
- Program crash
PID:2016
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 2882⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4776 -ip 47761⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2148 -ip 21481⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1596 -ip 15961⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2448 -ip 24481⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d23cb2f7260109f1ba0fb6a0c421036e
SHA1cbe67a2dcb3dd4f7d65d1f35500de8b2bbdc7f8b
SHA2568b365b619bcbb897cafb1c5eeb4ef9b5db811f4d102b44f613812c3f4e7892c2
SHA5124214744bd82f9185238f82e79cfc0430e794d587b2e7093a2ac9b114cb8af60c229bb8aead6d2f12f8def54baa7c6ba353640a8b16f924a86929c729c8e69d2b
-
Filesize
96KB
MD5396dcf79429d24a795687d8bc6bbf3d3
SHA1822b4e76c6b1d67998a2846d8d9f0f8a3e898905
SHA25603333317fec29ef3fa3de254256eaad62365ce7b7fa044eb367a9448eabb8fd1
SHA51296133042e16ff9b2716e878330aa587e64429fec78e0150fa7edd9ed3c1fea02f3bc6afe761b13f412e579dde65d8971b846323e8bcaae8961dafaf11aef6578
-
Filesize
96KB
MD5ea7d52c40b23c2c8cbabfee3f14050b7
SHA1573abbe289d9b7f8512624b6abba91ddcd94fad0
SHA25625d53ffca18dc1d793fcd7843a489fdb84b2e1b0391b75987d3e070399122139
SHA512c6b80132c476bb957b74b7b70f7c1423f735b31eb89818eb1d351a0662b28b61e84f78a3988e76b0c5ae43613d2b076f1ff2258766950aa946537ba849a8b6a3