Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
17/02/2025, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe
Resource
win7-20241010-en
General
-
Target
eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe
-
Size
134KB
-
MD5
eb59c001f373ac4b34189cb674096c40
-
SHA1
be962eb922113a3ce08b7f20c19d0608d386b51f
-
SHA256
eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793
-
SHA512
8f42dcf612823399326dd8e144f74feff30fab429831f23ee597bbe6df346ff2a2254997e33022d69e5d4d38bc2491e8641855c6a33ab3eeeb720b491d99b243
-
SSDEEP
1536:gDfDbhERTatPLTH0NqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwC7M:WiRTeH0NqAW6J6f1tqF6dngNmaZC7M
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3372 omsecor.exe 1616 omsecor.exe 116 omsecor.exe 5024 omsecor.exe 1316 omsecor.exe 5068 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3440 set thread context of 1564 3440 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 87 PID 3372 set thread context of 1616 3372 omsecor.exe 92 PID 116 set thread context of 5024 116 omsecor.exe 114 PID 1316 set thread context of 5068 1316 omsecor.exe 118 -
Program crash 4 IoCs
pid pid_target Process procid_target 2868 3440 WerFault.exe 86 2600 3372 WerFault.exe 89 3612 116 WerFault.exe 113 3600 1316 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2544 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3440 wrote to memory of 1564 3440 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 87 PID 3440 wrote to memory of 1564 3440 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 87 PID 3440 wrote to memory of 1564 3440 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 87 PID 3440 wrote to memory of 1564 3440 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 87 PID 3440 wrote to memory of 1564 3440 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 87 PID 1564 wrote to memory of 3372 1564 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 89 PID 1564 wrote to memory of 3372 1564 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 89 PID 1564 wrote to memory of 3372 1564 eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe 89 PID 3372 wrote to memory of 1616 3372 omsecor.exe 92 PID 3372 wrote to memory of 1616 3372 omsecor.exe 92 PID 3372 wrote to memory of 1616 3372 omsecor.exe 92 PID 3372 wrote to memory of 1616 3372 omsecor.exe 92 PID 3372 wrote to memory of 1616 3372 omsecor.exe 92 PID 1616 wrote to memory of 116 1616 omsecor.exe 113 PID 1616 wrote to memory of 116 1616 omsecor.exe 113 PID 1616 wrote to memory of 116 1616 omsecor.exe 113 PID 116 wrote to memory of 5024 116 omsecor.exe 114 PID 116 wrote to memory of 5024 116 omsecor.exe 114 PID 116 wrote to memory of 5024 116 omsecor.exe 114 PID 116 wrote to memory of 5024 116 omsecor.exe 114 PID 116 wrote to memory of 5024 116 omsecor.exe 114 PID 5024 wrote to memory of 1316 5024 omsecor.exe 116 PID 5024 wrote to memory of 1316 5024 omsecor.exe 116 PID 5024 wrote to memory of 1316 5024 omsecor.exe 116 PID 1316 wrote to memory of 5068 1316 omsecor.exe 118 PID 1316 wrote to memory of 5068 1316 omsecor.exe 118 PID 1316 wrote to memory of 5068 1316 omsecor.exe 118 PID 1316 wrote to memory of 5068 1316 omsecor.exe 118 PID 1316 wrote to memory of 5068 1316 omsecor.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe"C:\Users\Admin\AppData\Local\Temp\eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exeC:\Users\Admin\AppData\Local\Temp\eb99b1cd9e8a6f3af2b0d8cacbba0b5d1eb85d57797d8950a543ebbecf895793N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 2568⤵
- Program crash
PID:3600
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 2926⤵
- Program crash
PID:3612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 2884⤵
- Program crash
PID:2600
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 2882⤵
- Program crash
PID:2868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3440 -ip 34401⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3372 -ip 33721⤵PID:3060
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI5IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDQzOTQ2Mzc3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 116 -ip 1161⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1316 -ip 13161⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5dbcf2cc07805b849c4835ca616774d12
SHA107457e82616a85af17f083a422ee0a4d4b02f106
SHA25604d4ff6d792c029a97caa532e442aa6efdeaea3e18ae967bfb8edbe995dbdea5
SHA512af0f00fc29154eb8f7ca3e5aadbf4534860188d006875dad7f04fc22f0b640d4ab7f140b39f734dc0886cc519422c750d7518c8371272c82547e724c8271acf9
-
Filesize
134KB
MD5f1f79e918a927383c6c28686e0eeb3a5
SHA10637aa6955b10556ef6b0de0e060a1356c83dc45
SHA256c2815dd69d8d225390c8645204083aead0391e4b4c38a92b11cb52c8cac560dd
SHA512573ccf93a3449f626241d86a668cc37efd84651192363d34d6fa15d3ed5573202de716a2b2fa7d58e80404a664def7084c399053f9edddd7304cbb6bcf01e43e
-
Filesize
134KB
MD55771a4d59a372f4e080809c031db9487
SHA14c01137a194472139d40bfc5e957e4cb982db9d4
SHA2562594f122aad3ece451ce02c8402e6ff46e733b44e5219389d03520e4409dc002
SHA512cae58527a64fce9bf9cffae2dd26bf70e90fa1a2b095a3a746c6fb319b92b637267a5182308b6bfb6940e6be87a4507e38058de0c565bba4e7a695cc19a72c85