Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 18:51
Static task
static1
Behavioral task
behavioral1
Sample
04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe
Resource
win7-20241010-en
General
-
Target
04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe
-
Size
96KB
-
MD5
04d19ba87ec5e17d08b5d034006329c0
-
SHA1
c9ece5653d9dd3d8212a0e4722d5753f62c4ca8f
-
SHA256
04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90c
-
SHA512
04df3c3d0c633aa819dd8dbeab615f061d5046eb5bd0c73168904d50c33ccbe97ae7c11699d4c88e760ad5b660f3e4567572143c58762013d90075ff1a415257
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:zGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 212 omsecor.exe 1476 omsecor.exe 1352 omsecor.exe 3068 omsecor.exe 1444 omsecor.exe 5004 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3604 set thread context of 3988 3604 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 85 PID 212 set thread context of 1476 212 omsecor.exe 90 PID 1352 set thread context of 3068 1352 omsecor.exe 100 PID 1444 set thread context of 5004 1444 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4592 3604 WerFault.exe 84 2880 212 WerFault.exe 88 720 1352 WerFault.exe 99 4276 1444 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3604 wrote to memory of 3988 3604 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 85 PID 3604 wrote to memory of 3988 3604 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 85 PID 3604 wrote to memory of 3988 3604 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 85 PID 3604 wrote to memory of 3988 3604 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 85 PID 3604 wrote to memory of 3988 3604 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 85 PID 3988 wrote to memory of 212 3988 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 88 PID 3988 wrote to memory of 212 3988 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 88 PID 3988 wrote to memory of 212 3988 04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe 88 PID 212 wrote to memory of 1476 212 omsecor.exe 90 PID 212 wrote to memory of 1476 212 omsecor.exe 90 PID 212 wrote to memory of 1476 212 omsecor.exe 90 PID 212 wrote to memory of 1476 212 omsecor.exe 90 PID 212 wrote to memory of 1476 212 omsecor.exe 90 PID 1476 wrote to memory of 1352 1476 omsecor.exe 99 PID 1476 wrote to memory of 1352 1476 omsecor.exe 99 PID 1476 wrote to memory of 1352 1476 omsecor.exe 99 PID 1352 wrote to memory of 3068 1352 omsecor.exe 100 PID 1352 wrote to memory of 3068 1352 omsecor.exe 100 PID 1352 wrote to memory of 3068 1352 omsecor.exe 100 PID 1352 wrote to memory of 3068 1352 omsecor.exe 100 PID 1352 wrote to memory of 3068 1352 omsecor.exe 100 PID 3068 wrote to memory of 1444 3068 omsecor.exe 102 PID 3068 wrote to memory of 1444 3068 omsecor.exe 102 PID 3068 wrote to memory of 1444 3068 omsecor.exe 102 PID 1444 wrote to memory of 5004 1444 omsecor.exe 104 PID 1444 wrote to memory of 5004 1444 omsecor.exe 104 PID 1444 wrote to memory of 5004 1444 omsecor.exe 104 PID 1444 wrote to memory of 5004 1444 omsecor.exe 104 PID 1444 wrote to memory of 5004 1444 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe"C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exeC:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 2448⤵
- Program crash
PID:4276
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 2926⤵
- Program crash
PID:720
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 2884⤵
- Program crash
PID:2880
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 2882⤵
- Program crash
PID:4592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3604 -ip 36041⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 212 -ip 2121⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1352 -ip 13521⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1444 -ip 14441⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD535f4b0633266bfc09cd8e0180118fc0f
SHA1be6acb70120c3fa0e9194a300309299453f8cd82
SHA2567448cfe5eda7f48ab22a7952312bcd723ccd14a2b226951319a25fc62465beef
SHA512771c182727d95e81c6d4360d3fc36d5a94cf097759e8ad54ff58131f2fc045f0a898093ecd040bcc11480121b34a6b5147e772b8290f3405096f71ab47d2b59a
-
Filesize
96KB
MD5015ef091408362aee7661ea5b51ad5c4
SHA124bbe5e0ee111439a378f0e24af57b76d0732b24
SHA2565eb8136421ad315ff50a8cca57799615c42a09e57cc9e6e382d81732992def1b
SHA512c0b167e786296743162217c39e792547041f7bec8398697c30e752f61bf4d850e944684f3ee80b979df1a42d1cf3d5e647366b0624f842b3daaffa6679dbe0c0
-
Filesize
96KB
MD54934e06d11e71d5defcb3019c8ff038f
SHA1441e2acb5409a2fe0aba3bb2edc0840738c93ce4
SHA25622049b5462b35d64fd140e4ebc640a5f7e0a29cb08b300d8ca4a2789024269e2
SHA512870b0475f33fd2dfbcf00364c3a80aa2175cb05cbf1e2933cd8be8284cf310fec56a8064e47c08ab2834c115d77f99c8e29863fb0438449990f7fceffd51f4d9