Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 10:13
Static task
static1
Behavioral task
behavioral1
Sample
1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe
Resource
win7-20241010-en
General
-
Target
1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe
-
Size
96KB
-
MD5
c05aa5ddaa2ad216812b20ac9263b4f0
-
SHA1
317ba3deee0e68f8396530f2bbb9cc4bcb069291
-
SHA256
1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263
-
SHA512
c433489214638bc0b612bcf3fb7a8e067ec3243b48b0ec5bd98550b63db7e52c068d493c002f925b36d35f88d700718cbb7b50cb29dba81801a7eb7b5ffad5ac
-
SSDEEP
1536:nnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:nGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 928 omsecor.exe 1896 omsecor.exe 4160 omsecor.exe 4276 omsecor.exe 3244 omsecor.exe 2572 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 748 set thread context of 4412 748 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 84 PID 928 set thread context of 1896 928 omsecor.exe 89 PID 4160 set thread context of 4276 4160 omsecor.exe 102 PID 3244 set thread context of 2572 3244 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 1732 748 WerFault.exe 83 2464 928 WerFault.exe 87 972 4160 WerFault.exe 101 4020 3244 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 748 wrote to memory of 4412 748 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 84 PID 748 wrote to memory of 4412 748 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 84 PID 748 wrote to memory of 4412 748 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 84 PID 748 wrote to memory of 4412 748 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 84 PID 748 wrote to memory of 4412 748 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 84 PID 4412 wrote to memory of 928 4412 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 87 PID 4412 wrote to memory of 928 4412 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 87 PID 4412 wrote to memory of 928 4412 1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe 87 PID 928 wrote to memory of 1896 928 omsecor.exe 89 PID 928 wrote to memory of 1896 928 omsecor.exe 89 PID 928 wrote to memory of 1896 928 omsecor.exe 89 PID 928 wrote to memory of 1896 928 omsecor.exe 89 PID 928 wrote to memory of 1896 928 omsecor.exe 89 PID 1896 wrote to memory of 4160 1896 omsecor.exe 101 PID 1896 wrote to memory of 4160 1896 omsecor.exe 101 PID 1896 wrote to memory of 4160 1896 omsecor.exe 101 PID 4160 wrote to memory of 4276 4160 omsecor.exe 102 PID 4160 wrote to memory of 4276 4160 omsecor.exe 102 PID 4160 wrote to memory of 4276 4160 omsecor.exe 102 PID 4160 wrote to memory of 4276 4160 omsecor.exe 102 PID 4160 wrote to memory of 4276 4160 omsecor.exe 102 PID 4276 wrote to memory of 3244 4276 omsecor.exe 104 PID 4276 wrote to memory of 3244 4276 omsecor.exe 104 PID 4276 wrote to memory of 3244 4276 omsecor.exe 104 PID 3244 wrote to memory of 2572 3244 omsecor.exe 106 PID 3244 wrote to memory of 2572 3244 omsecor.exe 106 PID 3244 wrote to memory of 2572 3244 omsecor.exe 106 PID 3244 wrote to memory of 2572 3244 omsecor.exe 106 PID 3244 wrote to memory of 2572 3244 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe"C:\Users\Admin\AppData\Local\Temp\1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exeC:\Users\Admin\AppData\Local\Temp\1a44491707c45f4f2c40c4796c8eee537267e1a55d9e93e1445f1bb350bd6263N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 2568⤵
- Program crash
PID:4020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 2926⤵
- Program crash
PID:972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 3004⤵
- Program crash
PID:2464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 2882⤵
- Program crash
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 748 -ip 7481⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 928 -ip 9281⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4160 -ip 41601⤵PID:656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3244 -ip 32441⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58c5ab51c627ca6326614e817af64aee8
SHA17ad39edf283a7421174e55077c214de080f8cc51
SHA256a33096a7f6ffbb3e3f6c20907e3ea3b30ad6c196494d01a4ff44640c89252008
SHA512b6d106cdc1188dde7eca723f5a5b340422dcba45b758b4d1f062b29c89e9ff2cfafb90ad144e983c229494405ecc4311b52a3774f1b14d536d8c6e4e767058d5
-
Filesize
96KB
MD5da5d06f6bf42bcb22a1b2b837f268c12
SHA16aa47f0bada36130644ce9f2b389880a8fed5d78
SHA256c3db501f3a6b063404c0568381f5a37ffaab75bb0179f5da6d99d11935ba7f9b
SHA51252bf06236bb49a1dd8e38839deef5f8226b4a5afcba6662b9f2110d90c71608c1becd06dcd87e09bf5489fdff3409db5cec57952e0c031385470d322233c894d
-
Filesize
96KB
MD5794d27d4816bf1508ad63b5247f297f2
SHA162dc72cdad54a1c84138b69d77f9bf155dbd02bc
SHA25685391c795d49e6f8d4c1e7905307425179eb4ee399d6589d533df815ee748b84
SHA512a93e3b2169f52b7946aca6bf66d719e905af77c2d8d7b2db2b68257959d316783b11b80367482225dadd74593b56695c8bb8b704c943971ca69a761196cebdcc