Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 21:20
Static task
static1
Behavioral task
behavioral1
Sample
a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe
Resource
win7-20241023-en
General
-
Target
a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe
-
Size
134KB
-
MD5
f4be90352975039dc08cb4cfff1ab390
-
SHA1
e9e7d4d0d1f8da90d7748a18b21a6d2a579d9f2b
-
SHA256
a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203
-
SHA512
5bb9afc5872978bcfbdecf0997e54d1b8a091e3941e83a59164d4124d7c7ee48b68ac3814eb336c5226761f35965ecf413ec0d51a6d8a2c173c297b3db85fc2f
-
SSDEEP
1536:MDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:yiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3464 omsecor.exe 1572 omsecor.exe 1472 omsecor.exe 3288 omsecor.exe 4092 omsecor.exe 4176 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2404 set thread context of 2276 2404 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 83 PID 3464 set thread context of 1572 3464 omsecor.exe 88 PID 1472 set thread context of 3288 1472 omsecor.exe 100 PID 4092 set thread context of 4176 4092 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2012 2404 WerFault.exe 82 2148 3464 WerFault.exe 85 1316 1472 WerFault.exe 99 4480 4092 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2276 2404 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 83 PID 2404 wrote to memory of 2276 2404 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 83 PID 2404 wrote to memory of 2276 2404 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 83 PID 2404 wrote to memory of 2276 2404 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 83 PID 2404 wrote to memory of 2276 2404 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 83 PID 2276 wrote to memory of 3464 2276 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 85 PID 2276 wrote to memory of 3464 2276 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 85 PID 2276 wrote to memory of 3464 2276 a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe 85 PID 3464 wrote to memory of 1572 3464 omsecor.exe 88 PID 3464 wrote to memory of 1572 3464 omsecor.exe 88 PID 3464 wrote to memory of 1572 3464 omsecor.exe 88 PID 3464 wrote to memory of 1572 3464 omsecor.exe 88 PID 3464 wrote to memory of 1572 3464 omsecor.exe 88 PID 1572 wrote to memory of 1472 1572 omsecor.exe 99 PID 1572 wrote to memory of 1472 1572 omsecor.exe 99 PID 1572 wrote to memory of 1472 1572 omsecor.exe 99 PID 1472 wrote to memory of 3288 1472 omsecor.exe 100 PID 1472 wrote to memory of 3288 1472 omsecor.exe 100 PID 1472 wrote to memory of 3288 1472 omsecor.exe 100 PID 1472 wrote to memory of 3288 1472 omsecor.exe 100 PID 1472 wrote to memory of 3288 1472 omsecor.exe 100 PID 3288 wrote to memory of 4092 3288 omsecor.exe 102 PID 3288 wrote to memory of 4092 3288 omsecor.exe 102 PID 3288 wrote to memory of 4092 3288 omsecor.exe 102 PID 4092 wrote to memory of 4176 4092 omsecor.exe 104 PID 4092 wrote to memory of 4176 4092 omsecor.exe 104 PID 4092 wrote to memory of 4176 4092 omsecor.exe 104 PID 4092 wrote to memory of 4176 4092 omsecor.exe 104 PID 4092 wrote to memory of 4176 4092 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe"C:\Users\Admin\AppData\Local\Temp\a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exeC:\Users\Admin\AppData\Local\Temp\a20d8d15be6fd148f7481b57a9bcb9ee877eca2d85be64394e149d4e39769203N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4092 -s 2568⤵
- Program crash
PID:4480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 2966⤵
- Program crash
PID:1316
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 2884⤵
- Program crash
PID:2148
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2882⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2404 -ip 24041⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3464 -ip 34641⤵PID:1956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1472 -ip 14721⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4092 -ip 40921⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD535ad8872475c5a108733e83da29ebbec
SHA1164976e674e73ea2a73ff8f6b8d079123f647a80
SHA2568ab0a91132a5cc46fcb8a0750958c240b18293f9f687d256bb1b116db5b720e8
SHA512c8b084f776798ee99dfad30cb820b16da04c6ebfc27a9a1b3ac98a4e9fded9d5b336e454c7520ca5721d82874e8b5b9dbf67d290a0766ac78b55411187cfc5c9
-
Filesize
134KB
MD547ea24d32de825648a86967dd4c2b7f2
SHA16d6a59b5630a39fc8dea1bb37169e237ccf19802
SHA2561a4455972b1f0c6a3b893c2650be4f66bea2ee3023a08994d3a5eb01ff589fe4
SHA512308a1c734176ff6d19e7c14e63af6f08458cb2a64ffa0c37709877ff1be38b7dc6fff157b9ed9728623e344707d96bc791e8dcf9878327b5dc40b8754d0c8f3e
-
Filesize
134KB
MD56821f88bd850e80e53c449cd2c74f5c8
SHA13f3095733bd84d1547328209a499d044597707d0
SHA2566e89e1bfde3e81ed399d2c483c487876f26cf870f019c304edb4a939fe7970f3
SHA5124278a065dbbb8f383452f044a830bd5e359ff749d04dfd5cfd9ee245a3fb0117c4d3facc768c695d80f15b2940cb0d4441d8a9ba486bb0ffa035ee7d46514b01