Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 20:45
Static task
static1
Behavioral task
behavioral1
Sample
24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe
Resource
win7-20240903-en
General
-
Target
24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe
-
Size
96KB
-
MD5
927a6a54399c59df9014b46a0e8aa4b7
-
SHA1
ec20d79bce06eed76bb0314eddc6eb411e08ed97
-
SHA256
24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601
-
SHA512
9c37684f8f52ba02bb8b4ab9b7391f3dbbf0bab427a624a152d6f73590c5b2804d407a6081a476f4de9b995140bcfe641b000c193cddf4bef7e7e200622eb805
-
SSDEEP
1536:qnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:qGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1860 omsecor.exe 868 omsecor.exe 2816 omsecor.exe 4236 omsecor.exe 3596 omsecor.exe 3396 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 536 set thread context of 4484 536 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 85 PID 1860 set thread context of 868 1860 omsecor.exe 90 PID 2816 set thread context of 4236 2816 omsecor.exe 104 PID 3596 set thread context of 3396 3596 omsecor.exe 107 -
Program crash 4 IoCs
pid pid_target Process procid_target 1688 536 WerFault.exe 84 1796 1860 WerFault.exe 87 2868 2816 WerFault.exe 103 2308 3596 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 536 wrote to memory of 4484 536 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 85 PID 536 wrote to memory of 4484 536 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 85 PID 536 wrote to memory of 4484 536 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 85 PID 536 wrote to memory of 4484 536 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 85 PID 536 wrote to memory of 4484 536 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 85 PID 4484 wrote to memory of 1860 4484 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 87 PID 4484 wrote to memory of 1860 4484 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 87 PID 4484 wrote to memory of 1860 4484 24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe 87 PID 1860 wrote to memory of 868 1860 omsecor.exe 90 PID 1860 wrote to memory of 868 1860 omsecor.exe 90 PID 1860 wrote to memory of 868 1860 omsecor.exe 90 PID 1860 wrote to memory of 868 1860 omsecor.exe 90 PID 1860 wrote to memory of 868 1860 omsecor.exe 90 PID 868 wrote to memory of 2816 868 omsecor.exe 103 PID 868 wrote to memory of 2816 868 omsecor.exe 103 PID 868 wrote to memory of 2816 868 omsecor.exe 103 PID 2816 wrote to memory of 4236 2816 omsecor.exe 104 PID 2816 wrote to memory of 4236 2816 omsecor.exe 104 PID 2816 wrote to memory of 4236 2816 omsecor.exe 104 PID 2816 wrote to memory of 4236 2816 omsecor.exe 104 PID 2816 wrote to memory of 4236 2816 omsecor.exe 104 PID 4236 wrote to memory of 3596 4236 omsecor.exe 106 PID 4236 wrote to memory of 3596 4236 omsecor.exe 106 PID 4236 wrote to memory of 3596 4236 omsecor.exe 106 PID 3596 wrote to memory of 3396 3596 omsecor.exe 107 PID 3596 wrote to memory of 3396 3596 omsecor.exe 107 PID 3596 wrote to memory of 3396 3596 omsecor.exe 107 PID 3596 wrote to memory of 3396 3596 omsecor.exe 107 PID 3596 wrote to memory of 3396 3596 omsecor.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe"C:\Users\Admin\AppData\Local\Temp\24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exeC:\Users\Admin\AppData\Local\Temp\24a4f08f8568585eb049849288a3c0f33f1fc6ef92b4d679410238e51f284601.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 2568⤵
- Program crash
PID:2308
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2926⤵
- Program crash
PID:2868
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 3004⤵
- Program crash
PID:1796
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 2882⤵
- Program crash
PID:1688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 536 -ip 5361⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1860 -ip 18601⤵PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2816 -ip 28161⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3596 -ip 35961⤵PID:1692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD50c7572536cba161e123936d46041a404
SHA1a1c069ad23fce17a25e12eabd4c2e13d96a91278
SHA256ff2014845219a348ed1b31b56bc1ef87139bb439b4e80a17e4fe733d2e30369d
SHA512d5b6b62953a571c44ce460fdee4a5395058d80e7669916acb76ffae731b0dc987a0a925016b9b2dd982fdbfea31194a853470356355855fcce575e3f32ac21c0
-
Filesize
96KB
MD5fd6e1a60393fd78f66c7e6b1cd63d90f
SHA131c6bb0c469e068fe37450fab4af23f6043dd185
SHA256cffbe469f7c1b82fadbc5c3866d953857e33e839cd8eca773353385664570022
SHA512351db833a84f1257736a1d76f814ab93375083422008b578e968fc104d7533ec1bdeb9c1e166d53a7eb2316f32a23be822541882b3ddffa064362963727518ca
-
Filesize
96KB
MD5cfbf332a82b9e6d7f8f1a1b068655a44
SHA1257a49f3491a1241e0923ada2378b13036fa54b6
SHA256de1a7e4a7b206b602bc04ba24e77ee298b42fa9abb978b0d31ceb6350f2c9cd4
SHA5122bef0f26b9c2057cc0a049395fc9badac4ef9fdf874557d8fe2a7137a67ff7bb0fd10383bf60da041170f152e3fcb473fc6d36910a653f02ac3930da3e357412