Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 00:35
Static task
static1
Behavioral task
behavioral1
Sample
63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe
Resource
win7-20241010-en
General
-
Target
63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe
-
Size
96KB
-
MD5
5dd6db59424962a5e123881c19b46380
-
SHA1
bba3d5d68e45d81bd7b4a1dad83656fbe7426c25
-
SHA256
63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91
-
SHA512
f7bd90117ace88aed44538ae98d7a9e1b2837a6a81e3854d355a0cf1146edb619e4806480f76cd5bff438abbd4a997baa34405ea8ec9f65d840bbf50fb7ab862
-
SSDEEP
1536:tnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:tGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 432 omsecor.exe 4732 omsecor.exe 4996 omsecor.exe 964 omsecor.exe 2124 omsecor.exe 2900 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4060 set thread context of 396 4060 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 83 PID 432 set thread context of 4732 432 omsecor.exe 88 PID 4996 set thread context of 964 4996 omsecor.exe 98 PID 2124 set thread context of 2900 2124 omsecor.exe 102 -
Program crash 4 IoCs
pid pid_target Process procid_target 2332 4060 WerFault.exe 82 980 432 WerFault.exe 86 512 4996 WerFault.exe 97 4476 2124 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4060 wrote to memory of 396 4060 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 83 PID 4060 wrote to memory of 396 4060 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 83 PID 4060 wrote to memory of 396 4060 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 83 PID 4060 wrote to memory of 396 4060 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 83 PID 4060 wrote to memory of 396 4060 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 83 PID 396 wrote to memory of 432 396 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 86 PID 396 wrote to memory of 432 396 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 86 PID 396 wrote to memory of 432 396 63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe 86 PID 432 wrote to memory of 4732 432 omsecor.exe 88 PID 432 wrote to memory of 4732 432 omsecor.exe 88 PID 432 wrote to memory of 4732 432 omsecor.exe 88 PID 432 wrote to memory of 4732 432 omsecor.exe 88 PID 432 wrote to memory of 4732 432 omsecor.exe 88 PID 4732 wrote to memory of 4996 4732 omsecor.exe 97 PID 4732 wrote to memory of 4996 4732 omsecor.exe 97 PID 4732 wrote to memory of 4996 4732 omsecor.exe 97 PID 4996 wrote to memory of 964 4996 omsecor.exe 98 PID 4996 wrote to memory of 964 4996 omsecor.exe 98 PID 4996 wrote to memory of 964 4996 omsecor.exe 98 PID 4996 wrote to memory of 964 4996 omsecor.exe 98 PID 4996 wrote to memory of 964 4996 omsecor.exe 98 PID 964 wrote to memory of 2124 964 omsecor.exe 100 PID 964 wrote to memory of 2124 964 omsecor.exe 100 PID 964 wrote to memory of 2124 964 omsecor.exe 100 PID 2124 wrote to memory of 2900 2124 omsecor.exe 102 PID 2124 wrote to memory of 2900 2124 omsecor.exe 102 PID 2124 wrote to memory of 2900 2124 omsecor.exe 102 PID 2124 wrote to memory of 2900 2124 omsecor.exe 102 PID 2124 wrote to memory of 2900 2124 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe"C:\Users\Admin\AppData\Local\Temp\63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exeC:\Users\Admin\AppData\Local\Temp\63ed056e5f854dadae977cbe5b5c963d1415e0e9b6df733a668dd5c62ee6cd91N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 2568⤵
- Program crash
PID:4476
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 2926⤵
- Program crash
PID:512
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 2724⤵
- Program crash
PID:980
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 2882⤵
- Program crash
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4060 -ip 40601⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 432 -ip 4321⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4996 -ip 49961⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2124 -ip 21241⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d78886fccb41891636fd55221a68fe1c
SHA191243b806d6096f817fa9f03f1e51495c49f99f7
SHA25648dac87fd5cea4dcc9a056ea2734df522686f4df6dbfcaf805f217c55ddd6290
SHA5120532bad64c02c55dfea8de4ea0df6f8b3a150b40c63c1267e9936880206154ffa82f1d2a8596ea2e896f55fada3b782635a35a1e0a6d088e315a545fa8fbb00f
-
Filesize
96KB
MD57b95d5a8f7ad01bace3d3e3caf5b5e4c
SHA154484c7888d7e1003dfcd7c63c7796dea65c6895
SHA256c350dacfd221c8f51602297ceeeb13111e4ec31a2b2c66caa93069b7f107b485
SHA512d83cd29b0894a44f85ff62f3c847d9f99bbbc0fe071521cb5378d25215270d18458ecc6f2bc532e4deaeaf53cb331b245e5a7de7c33898db7eec00223406c5f8
-
Filesize
96KB
MD58ce82609f616e028819f17d21e5c09c5
SHA1506c96fae6f25f1cb9d8ed7bbb7101ebe706b02c
SHA256c06a0f7a87d8b35a1f3b9bd6500b64152c7158a76397c6726de050820773074f
SHA51222d3d6a5052b23efdc2542ba0e5cae481fa960a2ce95131b279028e278307e22af73db9c2483f3893e3cac631a67e405980e9baa4e8fc036056fa605a8522ce1