Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 13:18
Static task
static1
Behavioral task
behavioral1
Sample
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe
Resource
win7-20240708-en
General
-
Target
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe
-
Size
96KB
-
MD5
640036c324b6763e3397bdc9d5065426
-
SHA1
cb5ef36508ef3ecd646a80375141bc7379677a7e
-
SHA256
c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df
-
SHA512
e75a5e9d79d5df89f113a4d2ac5fba0d16dc201944e4dd0a6d440f4b569512dad11eaf57382569691aa307e8d85ce4acaf67c379a8524f20aa0ff319ee06cc35
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxp:MGs8cd8eXlYairZYqMddH13p
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3228 omsecor.exe 4172 omsecor.exe 1884 omsecor.exe 1116 omsecor.exe 64 omsecor.exe 1224 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4124 set thread context of 3840 4124 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 83 PID 3228 set thread context of 4172 3228 omsecor.exe 89 PID 1884 set thread context of 1116 1884 omsecor.exe 98 PID 64 set thread context of 1224 64 omsecor.exe 102 -
Program crash 4 IoCs
pid pid_target Process procid_target 2916 4124 WerFault.exe 82 792 3228 WerFault.exe 85 1956 1884 WerFault.exe 97 2468 64 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3840 4124 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 83 PID 4124 wrote to memory of 3840 4124 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 83 PID 4124 wrote to memory of 3840 4124 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 83 PID 4124 wrote to memory of 3840 4124 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 83 PID 4124 wrote to memory of 3840 4124 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 83 PID 3840 wrote to memory of 3228 3840 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 3840 wrote to memory of 3228 3840 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 3840 wrote to memory of 3228 3840 c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe 85 PID 3228 wrote to memory of 4172 3228 omsecor.exe 89 PID 3228 wrote to memory of 4172 3228 omsecor.exe 89 PID 3228 wrote to memory of 4172 3228 omsecor.exe 89 PID 3228 wrote to memory of 4172 3228 omsecor.exe 89 PID 3228 wrote to memory of 4172 3228 omsecor.exe 89 PID 4172 wrote to memory of 1884 4172 omsecor.exe 97 PID 4172 wrote to memory of 1884 4172 omsecor.exe 97 PID 4172 wrote to memory of 1884 4172 omsecor.exe 97 PID 1884 wrote to memory of 1116 1884 omsecor.exe 98 PID 1884 wrote to memory of 1116 1884 omsecor.exe 98 PID 1884 wrote to memory of 1116 1884 omsecor.exe 98 PID 1884 wrote to memory of 1116 1884 omsecor.exe 98 PID 1884 wrote to memory of 1116 1884 omsecor.exe 98 PID 1116 wrote to memory of 64 1116 omsecor.exe 100 PID 1116 wrote to memory of 64 1116 omsecor.exe 100 PID 1116 wrote to memory of 64 1116 omsecor.exe 100 PID 64 wrote to memory of 1224 64 omsecor.exe 102 PID 64 wrote to memory of 1224 64 omsecor.exe 102 PID 64 wrote to memory of 1224 64 omsecor.exe 102 PID 64 wrote to memory of 1224 64 omsecor.exe 102 PID 64 wrote to memory of 1224 64 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe"C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exeC:\Users\Admin\AppData\Local\Temp\c900f2a4119484877f293c23124cb8766f6015a2f0afa2616af5230ce1bc91df.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 2568⤵
- Program crash
PID:2468
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 2926⤵
- Program crash
PID:1956
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 2924⤵
- Program crash
PID:792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 2882⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4124 -ip 41241⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3228 -ip 32281⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1884 -ip 18841⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 64 -ip 641⤵PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5391a69dbbf3cffa0aefbd2d9fdbab007
SHA1c1cdd70fb7ef7a7c320419d42e8b7a328acd2009
SHA256be38c80e60052d35ab1b6922182df66ee028787eec4309b95da25b6178daa6e4
SHA512b5aba9bae055fb8b6d55c7e1a52b905d711fcb504cabcabd9612962f464d9b2577c1252bb01201a3f1a28708f68c0ad9b6c52f64f6371f446ec0c1e8afe88906
-
Filesize
96KB
MD5396dcf79429d24a795687d8bc6bbf3d3
SHA1822b4e76c6b1d67998a2846d8d9f0f8a3e898905
SHA25603333317fec29ef3fa3de254256eaad62365ce7b7fa044eb367a9448eabb8fd1
SHA51296133042e16ff9b2716e878330aa587e64429fec78e0150fa7edd9ed3c1fea02f3bc6afe761b13f412e579dde65d8971b846323e8bcaae8961dafaf11aef6578
-
Filesize
96KB
MD556eb7bb77c7453dfa72a93a14e1e50f6
SHA1d8d2b011309bb15fcffce6a1dc5f606396e2b4f3
SHA2565d0deffebc91f4d3b9d7612ed410f83b5b3fdb4b7120527c81f5ecc8614c7121
SHA512ca7ac55d81f6f7c4a687df8cb91a0d605b80938960f06de2ba4b121dbdd82843f45aaeae1b1a76e6a5071d053e148af3cea5de4465495759f7b9c2d13f010339