Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2025 05:20
Static task
static1
Behavioral task
behavioral1
Sample
c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe
Resource
win7-20241010-en
General
-
Target
c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe
-
Size
96KB
-
MD5
248c41cf2ed74592669cc5acbdddb78d
-
SHA1
25c1568262e4da6dab1b8f6fdb402988ec2c7bce
-
SHA256
c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f
-
SHA512
e06f7940fc7c63c7f6c458ba63b1160f73cbfeb297c5f9790029649f0f51450198a28354b1e0d86b0859f1a7cf2d9534f372f3f51a9e22eff21a0b365b54c570
-
SSDEEP
1536:InAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:IGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 44 2712 Process not Found -
Executes dropped EXE 6 IoCs
pid Process 2104 omsecor.exe 3180 omsecor.exe 4692 omsecor.exe 2984 omsecor.exe 3972 omsecor.exe 2436 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4692 set thread context of 3008 4692 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 88 PID 2104 set thread context of 3180 2104 omsecor.exe 92 PID 4692 set thread context of 2984 4692 omsecor.exe 107 PID 3972 set thread context of 2436 3972 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4792 4692 WerFault.exe 87 4940 2104 WerFault.exe 90 4872 4692 WerFault.exe 106 3380 3972 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3900 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3008 4692 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 88 PID 4692 wrote to memory of 3008 4692 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 88 PID 4692 wrote to memory of 3008 4692 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 88 PID 4692 wrote to memory of 3008 4692 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 88 PID 4692 wrote to memory of 3008 4692 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 88 PID 3008 wrote to memory of 2104 3008 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 90 PID 3008 wrote to memory of 2104 3008 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 90 PID 3008 wrote to memory of 2104 3008 c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe 90 PID 2104 wrote to memory of 3180 2104 omsecor.exe 92 PID 2104 wrote to memory of 3180 2104 omsecor.exe 92 PID 2104 wrote to memory of 3180 2104 omsecor.exe 92 PID 2104 wrote to memory of 3180 2104 omsecor.exe 92 PID 2104 wrote to memory of 3180 2104 omsecor.exe 92 PID 3180 wrote to memory of 4692 3180 omsecor.exe 106 PID 3180 wrote to memory of 4692 3180 omsecor.exe 106 PID 3180 wrote to memory of 4692 3180 omsecor.exe 106 PID 4692 wrote to memory of 2984 4692 omsecor.exe 107 PID 4692 wrote to memory of 2984 4692 omsecor.exe 107 PID 4692 wrote to memory of 2984 4692 omsecor.exe 107 PID 4692 wrote to memory of 2984 4692 omsecor.exe 107 PID 4692 wrote to memory of 2984 4692 omsecor.exe 107 PID 2984 wrote to memory of 3972 2984 omsecor.exe 109 PID 2984 wrote to memory of 3972 2984 omsecor.exe 109 PID 2984 wrote to memory of 3972 2984 omsecor.exe 109 PID 3972 wrote to memory of 2436 3972 omsecor.exe 112 PID 3972 wrote to memory of 2436 3972 omsecor.exe 112 PID 3972 wrote to memory of 2436 3972 omsecor.exe 112 PID 3972 wrote to memory of 2436 3972 omsecor.exe 112 PID 3972 wrote to memory of 2436 3972 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe"C:\Users\Admin\AppData\Local\Temp\c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exeC:\Users\Admin\AppData\Local\Temp\c8295a01550f82fec37690d20fb0496f9ba678d0c13d9ecf1cb8ae6f15fada1f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 2568⤵
- Program crash
PID:3380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 2926⤵
- Program crash
PID:4872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 2884⤵
- Program crash
PID:4940
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 2962⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4692 -ip 46921⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2104 -ip 21041⤵PID:864
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NjNGRUJCREUtNjMwNC00Qzc4LUFDMjctMTg3NTIxNDUzRkU5fSIgdXNlcmlkPSJ7QjQ4Nzk2RDQtQUIzQS00NDQ2LTlGNkQtNDY1OUNENzExQkM5fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NzAwRDZFMjEtMkQxMy00REU0LUI0OEItNzQyQjM0MDlFRUMwfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDcxNzgiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTY4MDM3MTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTUxODQ2MjAxIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4692 -ip 46921⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3972 -ip 39721⤵PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d4a678bf59d2ce9301b0fc1ecd289e22
SHA10c07e9c27f611662498d7a387445a42acf35afcd
SHA25673118b5e48c8e597e7ebedb060c0ad2720e51a0182bcb9cade09154bec4eaad8
SHA512057e725bee0f8ac3008dbfe2aa477bf719b0ba0f1c1609002bc02236d7c17841651853cf762d1723f1c2ff702d63023d728a403ae7e7152d2759a18e02aebb2e
-
Filesize
96KB
MD578fe6209b79c5df0b373590c909a4ded
SHA15ae4003cd2187a5a62cc7df72ed4ff26b15fd501
SHA2568d084874f12d6db01d0ca24417962798d3341099121624e4bac2b2bdc61b24b8
SHA5120765b7837a8e4f9236c052f658af4a700a9504fe1892e24710c9a7ce7768075af4e5ca9ce749090d7835b12aaee45386b0290b5ed8153acfd9d82441692eebe1
-
Filesize
96KB
MD5b7ff78dc27e8dfcb5b38be490a586484
SHA13b1cef8b2fe2bff699404cbdf1b54fa2f957e35a
SHA256015f8db268171c8619578b378fe469b05b73d037ba7096fcae3d165f05f60845
SHA5124c020d338d8d6bcd3da771b7f5445d6ac91d4dc9de266ad061fdcffc7ed06dea07ca94a0f04016014a589a1af7639c1814b039c0ba90461a166c4183e6d2effc