Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 04:24
Static task
static1
Behavioral task
behavioral1
Sample
cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe
Resource
win7-20240729-en
General
-
Target
cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe
-
Size
96KB
-
MD5
7b36c6a0efbe6cc7449596ed82e309cd
-
SHA1
e935b2fc7675a6d9769311b8fe2ab4712d32f3bf
-
SHA256
cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a
-
SHA512
9d0592be95baecff12af33105fbdecc0c58da96b7ea28bd947f9a7731f2bd8ef709bb285477641128c27308e4f5ae64dbfa6ae9971f1c522966351810dba5239
-
SSDEEP
1536:OnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx5:OGs8cd8eXlYairZYqMddH135
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1928 omsecor.exe 2504 omsecor.exe 2916 omsecor.exe 4936 omsecor.exe 3716 omsecor.exe 2796 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2972 set thread context of 1972 2972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 83 PID 1928 set thread context of 2504 1928 omsecor.exe 88 PID 2916 set thread context of 4936 2916 omsecor.exe 103 PID 3716 set thread context of 2796 3716 omsecor.exe 107 -
Program crash 4 IoCs
pid pid_target Process procid_target 4444 2972 WerFault.exe 82 3660 1928 WerFault.exe 85 1420 2916 WerFault.exe 102 2652 3716 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1972 2972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 83 PID 2972 wrote to memory of 1972 2972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 83 PID 2972 wrote to memory of 1972 2972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 83 PID 2972 wrote to memory of 1972 2972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 83 PID 2972 wrote to memory of 1972 2972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 83 PID 1972 wrote to memory of 1928 1972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 85 PID 1972 wrote to memory of 1928 1972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 85 PID 1972 wrote to memory of 1928 1972 cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe 85 PID 1928 wrote to memory of 2504 1928 omsecor.exe 88 PID 1928 wrote to memory of 2504 1928 omsecor.exe 88 PID 1928 wrote to memory of 2504 1928 omsecor.exe 88 PID 1928 wrote to memory of 2504 1928 omsecor.exe 88 PID 1928 wrote to memory of 2504 1928 omsecor.exe 88 PID 2504 wrote to memory of 2916 2504 omsecor.exe 102 PID 2504 wrote to memory of 2916 2504 omsecor.exe 102 PID 2504 wrote to memory of 2916 2504 omsecor.exe 102 PID 2916 wrote to memory of 4936 2916 omsecor.exe 103 PID 2916 wrote to memory of 4936 2916 omsecor.exe 103 PID 2916 wrote to memory of 4936 2916 omsecor.exe 103 PID 2916 wrote to memory of 4936 2916 omsecor.exe 103 PID 2916 wrote to memory of 4936 2916 omsecor.exe 103 PID 4936 wrote to memory of 3716 4936 omsecor.exe 105 PID 4936 wrote to memory of 3716 4936 omsecor.exe 105 PID 4936 wrote to memory of 3716 4936 omsecor.exe 105 PID 3716 wrote to memory of 2796 3716 omsecor.exe 107 PID 3716 wrote to memory of 2796 3716 omsecor.exe 107 PID 3716 wrote to memory of 2796 3716 omsecor.exe 107 PID 3716 wrote to memory of 2796 3716 omsecor.exe 107 PID 3716 wrote to memory of 2796 3716 omsecor.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe"C:\Users\Admin\AppData\Local\Temp\cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exeC:\Users\Admin\AppData\Local\Temp\cbd9a43b62486c673d03b1460839a152479747e7221e114a7d1570744728cc5a.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 2648⤵
- Program crash
PID:2652
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 2926⤵
- Program crash
PID:1420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 3004⤵
- Program crash
PID:3660
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 2882⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2972 -ip 29721⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1928 -ip 19281⤵PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2916 -ip 29161⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3716 -ip 37161⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5cf941ab94d763dea40c58d4964901b9b
SHA1facf8c2f50eb176dff0db5819fcf2f805a687360
SHA2564714ba534b2c543abe995649754c7a945f90c9c2ff3649659f74ba8af891e25c
SHA512a64fe7684a6ff50cf2885d49df18434a4bcbf06f3f53a0e531687bfad6b74e4923382b740755bc3db08ca025645e27df5fa05717c030f77ea3eedfdbe9763301
-
Filesize
96KB
MD5552f63b7af00fbe5784371af1ed49515
SHA1874e8f1185186679ad26e36e87595f86ad897f07
SHA2566e162b9ff2cf40f0cff347694034b97f3540c7dff43bb45cc18f5a1e96fa5860
SHA512ba375970b2f351cfe6c7201f72b6af4f8a8176844bb2067adb49fd288a816819a37b2b4a7d21b3cdb94f2b251a21347b09ebf8a087133e134d060ab3b294ab9a
-
Filesize
96KB
MD5ac2cc78c4c564e2362d5d4387c20e290
SHA1858d0448804a4053fde605f653c0f036af93d225
SHA256d1e55ff329a478d6475d7fd6f751b0d55b89f76aec6c41d507cb0c721fda3685
SHA51285421cfa138866cb21731e967a3a9c1fb33338387f0e1c40af33dc11a237326c832bc838319f6cb2059c65c0e742e1c77b22e82e0d0147efa694152a673a6199