Analysis
-
max time kernel
115s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 14:39
Static task
static1
Behavioral task
behavioral1
Sample
0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe
Resource
win7-20241010-en
General
-
Target
0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe
-
Size
96KB
-
MD5
b9173234f4b162cbf72c6f313eb81810
-
SHA1
656b03c93268845cec34e5eeb82076163a166673
-
SHA256
0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430be
-
SHA512
858e49e6cf15c7675f620a2fd2d54bc84f33d635de8569fa9af810e7a2169c393a88e9a1548b285a118b269c7752214c6bc0411193797271b8badcb2d81390b0
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:MGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4032 omsecor.exe 3816 omsecor.exe 1636 omsecor.exe 1708 omsecor.exe 3152 omsecor.exe 3720 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4324 set thread context of 4932 4324 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 84 PID 4032 set thread context of 3816 4032 omsecor.exe 89 PID 1636 set thread context of 1708 1636 omsecor.exe 102 PID 3152 set thread context of 3720 3152 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 1664 4324 WerFault.exe 83 680 4032 WerFault.exe 87 4356 1636 WerFault.exe 101 4924 3152 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4932 4324 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 84 PID 4324 wrote to memory of 4932 4324 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 84 PID 4324 wrote to memory of 4932 4324 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 84 PID 4324 wrote to memory of 4932 4324 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 84 PID 4324 wrote to memory of 4932 4324 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 84 PID 4932 wrote to memory of 4032 4932 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 87 PID 4932 wrote to memory of 4032 4932 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 87 PID 4932 wrote to memory of 4032 4932 0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe 87 PID 4032 wrote to memory of 3816 4032 omsecor.exe 89 PID 4032 wrote to memory of 3816 4032 omsecor.exe 89 PID 4032 wrote to memory of 3816 4032 omsecor.exe 89 PID 4032 wrote to memory of 3816 4032 omsecor.exe 89 PID 4032 wrote to memory of 3816 4032 omsecor.exe 89 PID 3816 wrote to memory of 1636 3816 omsecor.exe 101 PID 3816 wrote to memory of 1636 3816 omsecor.exe 101 PID 3816 wrote to memory of 1636 3816 omsecor.exe 101 PID 1636 wrote to memory of 1708 1636 omsecor.exe 102 PID 1636 wrote to memory of 1708 1636 omsecor.exe 102 PID 1636 wrote to memory of 1708 1636 omsecor.exe 102 PID 1636 wrote to memory of 1708 1636 omsecor.exe 102 PID 1636 wrote to memory of 1708 1636 omsecor.exe 102 PID 1708 wrote to memory of 3152 1708 omsecor.exe 104 PID 1708 wrote to memory of 3152 1708 omsecor.exe 104 PID 1708 wrote to memory of 3152 1708 omsecor.exe 104 PID 3152 wrote to memory of 3720 3152 omsecor.exe 106 PID 3152 wrote to memory of 3720 3152 omsecor.exe 106 PID 3152 wrote to memory of 3720 3152 omsecor.exe 106 PID 3152 wrote to memory of 3720 3152 omsecor.exe 106 PID 3152 wrote to memory of 3720 3152 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe"C:\Users\Admin\AppData\Local\Temp\0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exeC:\Users\Admin\AppData\Local\Temp\0caa9c5b37c8bfa49576d4e3e9d739650f9f79b51519bb9840462bcb142430beN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 2528⤵
- Program crash
PID:4924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 2926⤵
- Program crash
PID:4356
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 2884⤵
- Program crash
PID:680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 2882⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4324 -ip 43241⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4032 -ip 40321⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1636 -ip 16361⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3152 -ip 31521⤵PID:4856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55fb8fa8ba887910b943c979a5af1dace
SHA13a7e00f66fa703d78d61b67dcd10878ed20d6451
SHA256b2450179b91ad86bf12c4c83c5175b74e4f7d6eb1d225c443b05f4f6c4fbb207
SHA512634be731e589cf11f084a5994c27a18e62b643015c87ca3ef99df100934a79b4fa1e55361c4e95f7becb4ce720de56d82ac4933cb82fd14d50a525ab65a92361
-
Filesize
96KB
MD53c92b3476c9e9d161417b888686c1300
SHA1d245dc0c6f2ca4053ec01f942546f5b7f30ca1e9
SHA256fca75f65d917071448bcba065c182e59f4f4c618bb8f74aa09114b9998960d47
SHA5125aff3e9b26d83c085e6e5870e0b5b41e2c53998c7344eacc5c83426b81ce3b3611c40a9db7e2f9b377bbb38fab4674f9ec391dc4484eaa4dbb6b792de1aa9c98
-
Filesize
96KB
MD5d2cd34cf2d6813b1bbf5c7c53c9338b9
SHA113d0242c392f5cfb1244e12dcc5549f8958422f2
SHA256c661dd5e14f5d7753d28bd33a0f434a28593d9ad38114acb1f2404f6c81e9b4e
SHA5129d66d5d55bce80426c5c48c6443e86804ca5ac3e99270b48cc2405e4ddbd0f8ffea40a670d289b5438915ae0452e379213b7fc7082cf3e90cb5c303ff5c939bb