Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 18:21
Static task
static1
Behavioral task
behavioral1
Sample
63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe
Resource
win7-20241023-en
General
-
Target
63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe
-
Size
134KB
-
MD5
9bb2167d80542b7a8deb1ac220bb58cb
-
SHA1
58e2bf1aca2c5391074cbf46a07b57910c1c0b28
-
SHA256
63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553
-
SHA512
3bcda1bb9de8048488c48c508aa324fae574e0801b658334f863dd847ea6368782cace737d5064b8d67ee3f2ab5b7d95b6bd76b09cd001a9a1d1f5cd6447d903
-
SSDEEP
1536:cDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCif:CiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3188 omsecor.exe 4256 omsecor.exe 3420 omsecor.exe 376 omsecor.exe 1436 omsecor.exe 1020 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 400 set thread context of 2608 400 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 82 PID 3188 set thread context of 4256 3188 omsecor.exe 86 PID 3420 set thread context of 376 3420 omsecor.exe 97 PID 1436 set thread context of 1020 1436 omsecor.exe 100 -
Program crash 4 IoCs
pid pid_target Process procid_target 1100 400 WerFault.exe 81 3368 3188 WerFault.exe 85 4324 3420 WerFault.exe 96 2216 1436 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 400 wrote to memory of 2608 400 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 82 PID 400 wrote to memory of 2608 400 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 82 PID 400 wrote to memory of 2608 400 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 82 PID 400 wrote to memory of 2608 400 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 82 PID 400 wrote to memory of 2608 400 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 82 PID 2608 wrote to memory of 3188 2608 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 85 PID 2608 wrote to memory of 3188 2608 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 85 PID 2608 wrote to memory of 3188 2608 63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe 85 PID 3188 wrote to memory of 4256 3188 omsecor.exe 86 PID 3188 wrote to memory of 4256 3188 omsecor.exe 86 PID 3188 wrote to memory of 4256 3188 omsecor.exe 86 PID 3188 wrote to memory of 4256 3188 omsecor.exe 86 PID 3188 wrote to memory of 4256 3188 omsecor.exe 86 PID 4256 wrote to memory of 3420 4256 omsecor.exe 96 PID 4256 wrote to memory of 3420 4256 omsecor.exe 96 PID 4256 wrote to memory of 3420 4256 omsecor.exe 96 PID 3420 wrote to memory of 376 3420 omsecor.exe 97 PID 3420 wrote to memory of 376 3420 omsecor.exe 97 PID 3420 wrote to memory of 376 3420 omsecor.exe 97 PID 3420 wrote to memory of 376 3420 omsecor.exe 97 PID 3420 wrote to memory of 376 3420 omsecor.exe 97 PID 376 wrote to memory of 1436 376 omsecor.exe 99 PID 376 wrote to memory of 1436 376 omsecor.exe 99 PID 376 wrote to memory of 1436 376 omsecor.exe 99 PID 1436 wrote to memory of 1020 1436 omsecor.exe 100 PID 1436 wrote to memory of 1020 1436 omsecor.exe 100 PID 1436 wrote to memory of 1020 1436 omsecor.exe 100 PID 1436 wrote to memory of 1020 1436 omsecor.exe 100 PID 1436 wrote to memory of 1020 1436 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe"C:\Users\Admin\AppData\Local\Temp\63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exeC:\Users\Admin\AppData\Local\Temp\63440946f61f4733abc98e668831f1197d29e3d380bd942e3b4942a943984553.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 2688⤵
- Program crash
PID:2216
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 2926⤵
- Program crash
PID:4324
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 2724⤵
- Program crash
PID:3368
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 400 -s 2882⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 400 -ip 4001⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3188 -ip 31881⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3420 -ip 34201⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1436 -ip 14361⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5a1123926803b37000fd3ed1e3c4fd715
SHA1ba2d575e9bf74d74f0c51ba7ddaf9a604c38e212
SHA2561f71a9ffc06dc1e2eaea59a8b0f90b0cb51bcaa573b7797fd478a7ac2a46bca2
SHA5120942ef06510ffcaf99869d250b5c90bdc7b9b3dd9337ba96fa894e1a11f5e35b82ba5da2dafa210e25658ba1658ad62e2b23d00dd491ce5bdae0530a0596a5c5
-
Filesize
134KB
MD56080bc5d4ebb344329f2212bc55ac00e
SHA1d7eed95b5e415be1dff1b003598acee87da8295f
SHA25601e2466cee5b43bdc1c680647d80f81563757d0ad57e3d67bd3feedde035b6e0
SHA5120ecf9b21e1cd17dd43563ac68c4c3b9c032eb48f929d6f1e6f95f29480f299c47e75f48448a0e2cfa510cc3da889095505f2e6353f5181003a7d552d6eaeb114
-
Filesize
134KB
MD5422abaf7ca762bce8dd7797894ea1bf9
SHA1e725c296b4f725ebcbb87bd4d62e1d6853385ae6
SHA256b6a6e5ea40ee4d40a3e840ae065338ee0925c987615d5513d41938f3230e857e
SHA512bc082799c49b8161110df83a4e1ef3203832ecb5c128e373cdf7227ea71398c81f066aeb966d5e370395fa48305e2eb8a52d4c7e6c59b970118c44bed1256b3d