Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 06:43
Static task
static1
Behavioral task
behavioral1
Sample
c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe
Resource
win7-20241010-en
General
-
Target
c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe
-
Size
96KB
-
MD5
2acb002195d7adb3c6eace37311cb4c0
-
SHA1
685bf6ed8201ad3465d414987f997b6712434536
-
SHA256
c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426
-
SHA512
4f1fcff94d824216d41be3aaf4723912e013b01c0830c298d778c30b1fc501346bbe0751e647542b42f4ebe19061927d835863a568cf35577318312c51ad1129
-
SSDEEP
1536:AnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:AGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2340 omsecor.exe 3480 omsecor.exe 1616 omsecor.exe 2168 omsecor.exe 4000 omsecor.exe 932 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3836 set thread context of 2084 3836 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 82 PID 2340 set thread context of 3480 2340 omsecor.exe 87 PID 1616 set thread context of 2168 1616 omsecor.exe 100 PID 4000 set thread context of 932 4000 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4720 3836 WerFault.exe 81 4432 2340 WerFault.exe 85 372 1616 WerFault.exe 99 1376 4000 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3836 wrote to memory of 2084 3836 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 82 PID 3836 wrote to memory of 2084 3836 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 82 PID 3836 wrote to memory of 2084 3836 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 82 PID 3836 wrote to memory of 2084 3836 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 82 PID 3836 wrote to memory of 2084 3836 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 82 PID 2084 wrote to memory of 2340 2084 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 85 PID 2084 wrote to memory of 2340 2084 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 85 PID 2084 wrote to memory of 2340 2084 c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe 85 PID 2340 wrote to memory of 3480 2340 omsecor.exe 87 PID 2340 wrote to memory of 3480 2340 omsecor.exe 87 PID 2340 wrote to memory of 3480 2340 omsecor.exe 87 PID 2340 wrote to memory of 3480 2340 omsecor.exe 87 PID 2340 wrote to memory of 3480 2340 omsecor.exe 87 PID 3480 wrote to memory of 1616 3480 omsecor.exe 99 PID 3480 wrote to memory of 1616 3480 omsecor.exe 99 PID 3480 wrote to memory of 1616 3480 omsecor.exe 99 PID 1616 wrote to memory of 2168 1616 omsecor.exe 100 PID 1616 wrote to memory of 2168 1616 omsecor.exe 100 PID 1616 wrote to memory of 2168 1616 omsecor.exe 100 PID 1616 wrote to memory of 2168 1616 omsecor.exe 100 PID 1616 wrote to memory of 2168 1616 omsecor.exe 100 PID 2168 wrote to memory of 4000 2168 omsecor.exe 102 PID 2168 wrote to memory of 4000 2168 omsecor.exe 102 PID 2168 wrote to memory of 4000 2168 omsecor.exe 102 PID 4000 wrote to memory of 932 4000 omsecor.exe 104 PID 4000 wrote to memory of 932 4000 omsecor.exe 104 PID 4000 wrote to memory of 932 4000 omsecor.exe 104 PID 4000 wrote to memory of 932 4000 omsecor.exe 104 PID 4000 wrote to memory of 932 4000 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe"C:\Users\Admin\AppData\Local\Temp\c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exeC:\Users\Admin\AppData\Local\Temp\c4daa36733b2be3d5cb89ab16807fd5e790bec05ee849df1db7723f316586426N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 2568⤵
- Program crash
PID:1376
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2926⤵
- Program crash
PID:372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 3004⤵
- Program crash
PID:4432
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 2882⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3836 -ip 38361⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2340 -ip 23401⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1616 -ip 16161⤵PID:1860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4000 -ip 40001⤵PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5364844142f2a078aa7ddb69580e6796a
SHA1e0502380a30662a3b3909e886b400fb1418e4155
SHA256df68b01bf9200f74912a6b8ac444b6480a87872ff6236882024ea5b46327a539
SHA512b74d86ab468d799d716027393374dff2ede952f494bf7a82d9a4c272e55b72f45e37bb240f3828d89b938a333abf98f55b98c49d11e7d558926fb4d710b58153
-
Filesize
96KB
MD5b6e040d7c07f726d569c9c28faa7b7a0
SHA138f0bb2980a8b099c5c2800d6b5127e18a5e9ef5
SHA256359244f68fc915236a6983c922263b926b1f02d93b0149452dc25ed6b642de10
SHA512aa3feca21e344be149e0006e46f90ea81257795a3e94cc6de90e6cd9d468b60cfc1167f346f8053fb198d3b05f8f05557450bfe23e80d01e1439a45f08fb9afc
-
Filesize
96KB
MD5a7365a3c3a41ec0d14d08b08b86c98c1
SHA1500795118f59711a2ff672d6e8d67037ad98b9b0
SHA2560139d54808cf4d6fab95f02964f692f854c70795d352a44a332f1b5e17771cae
SHA512f4585bddc42ddc5952c220070b767f4ab34c38b2fb1be3b3a3a10b78cc15613cc7f4457104b94c933566e687f8ab3a47b659c6120d70aa949c517c4b16a61ac3