Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 12:04
Static task
static1
Behavioral task
behavioral1
Sample
8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe
Resource
win7-20240903-en
General
-
Target
8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe
-
Size
96KB
-
MD5
20f598dc0670e96b74bbb6459acecb7a
-
SHA1
0b5408761377fc586bab392f277ccb345b863e31
-
SHA256
8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9
-
SHA512
66205064f7ce794dc7fdd0fa58b128f411be9505203bb504b340ededd06f3e00df37732affd3ae2fc9609f1ee9b69440aaa52e8f9908d7d26c7bf0572505b7af
-
SSDEEP
1536:pnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxT:pGs8cd8eXlYairZYqMddH13T
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2472 omsecor.exe 4072 omsecor.exe 464 omsecor.exe 3304 omsecor.exe 2404 omsecor.exe 4960 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3320 set thread context of 3660 3320 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 83 PID 2472 set thread context of 4072 2472 omsecor.exe 88 PID 464 set thread context of 3304 464 omsecor.exe 102 PID 2404 set thread context of 4960 2404 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 1140 3320 WerFault.exe 82 3348 2472 WerFault.exe 86 1948 464 WerFault.exe 101 4904 2404 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3320 wrote to memory of 3660 3320 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 83 PID 3320 wrote to memory of 3660 3320 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 83 PID 3320 wrote to memory of 3660 3320 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 83 PID 3320 wrote to memory of 3660 3320 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 83 PID 3320 wrote to memory of 3660 3320 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 83 PID 3660 wrote to memory of 2472 3660 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 86 PID 3660 wrote to memory of 2472 3660 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 86 PID 3660 wrote to memory of 2472 3660 8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe 86 PID 2472 wrote to memory of 4072 2472 omsecor.exe 88 PID 2472 wrote to memory of 4072 2472 omsecor.exe 88 PID 2472 wrote to memory of 4072 2472 omsecor.exe 88 PID 2472 wrote to memory of 4072 2472 omsecor.exe 88 PID 2472 wrote to memory of 4072 2472 omsecor.exe 88 PID 4072 wrote to memory of 464 4072 omsecor.exe 101 PID 4072 wrote to memory of 464 4072 omsecor.exe 101 PID 4072 wrote to memory of 464 4072 omsecor.exe 101 PID 464 wrote to memory of 3304 464 omsecor.exe 102 PID 464 wrote to memory of 3304 464 omsecor.exe 102 PID 464 wrote to memory of 3304 464 omsecor.exe 102 PID 464 wrote to memory of 3304 464 omsecor.exe 102 PID 464 wrote to memory of 3304 464 omsecor.exe 102 PID 3304 wrote to memory of 2404 3304 omsecor.exe 104 PID 3304 wrote to memory of 2404 3304 omsecor.exe 104 PID 3304 wrote to memory of 2404 3304 omsecor.exe 104 PID 2404 wrote to memory of 4960 2404 omsecor.exe 106 PID 2404 wrote to memory of 4960 2404 omsecor.exe 106 PID 2404 wrote to memory of 4960 2404 omsecor.exe 106 PID 2404 wrote to memory of 4960 2404 omsecor.exe 106 PID 2404 wrote to memory of 4960 2404 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe"C:\Users\Admin\AppData\Local\Temp\8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exeC:\Users\Admin\AppData\Local\Temp\8f9006f7a9e06b1e6b6d1781f5beb5c836f9c079b3f1197109b101090921ecd9.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2688⤵
- Program crash
PID:4904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 2926⤵
- Program crash
PID:1948
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 2724⤵
- Program crash
PID:3348
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 2882⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3320 -ip 33201⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2472 -ip 24721⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 464 -ip 4641⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2404 -ip 24041⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD529ac5cc195f6d577a692ff0986d47639
SHA192dd110a9f1813aa821db481843708a3421c8678
SHA256d1fc02bccffbda3ff0fe96d5a29a052d305ece36991a8b639442f4266987232a
SHA512e86ac708d31cfdc810c1dcb1fa814f029ce3956c6e5ea9d3facaa1487d4e7fd2150916165cb14f5779bc48e09f9fef34d9335668a1905271060620e6d9a24cc6
-
Filesize
96KB
MD536a43408f17acd1fb035da2d32033ebd
SHA15364b264d9871a6adbe8f8391695a3b99bad3cea
SHA25623c003d549addf4ff630da9587a0c55fe998db9341fa84aee2cae5d5aefd9182
SHA512da8d176c44f2021d23621b420406b0f673bba04e7c40b6b452fd85e277e2fa23a3570167736e74dc7fe78215caeb1b2560e1051b03719ee67f4ab7e804284dc3
-
Filesize
96KB
MD5669e597534c3a061324a9a85ecfeb31d
SHA132e3cea9dd1befa35a07f6de85bb40f1805469e4
SHA2565ab7e6f048e143ee118bea5fb6c79995f9ac7a39059431ff3f8c701ada01016d
SHA512ec91f25b1b9c8e787122df06b206e7f9bad9e4d5efaedb1021deaff0ee89ab862bd77a9374d21c7cfcf9efed849b3fc04dfb52a819db09262d37cdef710e4544