Analysis
-
max time kernel
116s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe
Resource
win7-20241010-en
General
-
Target
e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe
-
Size
96KB
-
MD5
8e73e501734b63cb8cadc886e05bae70
-
SHA1
d605f1278198f3d02740ca868270a2291143aebb
-
SHA256
e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69c
-
SHA512
d1427314fe7609ec33a489cb5e6b13b1d1bba9e25b3b172b36de9e7db9b55c8c1db976e57789c094ec43ff0d0a8451173807a7b369954cf5fd6d4effd33bc61c
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:xGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1428 omsecor.exe 3496 omsecor.exe 1176 omsecor.exe 2732 omsecor.exe 4268 omsecor.exe 1004 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2824 set thread context of 2216 2824 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 86 PID 1428 set thread context of 3496 1428 omsecor.exe 91 PID 1176 set thread context of 2732 1176 omsecor.exe 108 PID 4268 set thread context of 1004 4268 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 840 1428 WerFault.exe 3744 2824 WerFault.exe 84 3836 1176 WerFault.exe 107 1612 4268 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2216 2824 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 86 PID 2824 wrote to memory of 2216 2824 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 86 PID 2824 wrote to memory of 2216 2824 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 86 PID 2824 wrote to memory of 2216 2824 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 86 PID 2824 wrote to memory of 2216 2824 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 86 PID 2216 wrote to memory of 1428 2216 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 89 PID 2216 wrote to memory of 1428 2216 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 89 PID 2216 wrote to memory of 1428 2216 e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe 89 PID 1428 wrote to memory of 3496 1428 omsecor.exe 91 PID 1428 wrote to memory of 3496 1428 omsecor.exe 91 PID 1428 wrote to memory of 3496 1428 omsecor.exe 91 PID 1428 wrote to memory of 3496 1428 omsecor.exe 91 PID 1428 wrote to memory of 3496 1428 omsecor.exe 91 PID 3496 wrote to memory of 1176 3496 omsecor.exe 107 PID 3496 wrote to memory of 1176 3496 omsecor.exe 107 PID 3496 wrote to memory of 1176 3496 omsecor.exe 107 PID 1176 wrote to memory of 2732 1176 omsecor.exe 108 PID 1176 wrote to memory of 2732 1176 omsecor.exe 108 PID 1176 wrote to memory of 2732 1176 omsecor.exe 108 PID 1176 wrote to memory of 2732 1176 omsecor.exe 108 PID 1176 wrote to memory of 2732 1176 omsecor.exe 108 PID 2732 wrote to memory of 4268 2732 omsecor.exe 110 PID 2732 wrote to memory of 4268 2732 omsecor.exe 110 PID 2732 wrote to memory of 4268 2732 omsecor.exe 110 PID 4268 wrote to memory of 1004 4268 omsecor.exe 112 PID 4268 wrote to memory of 1004 4268 omsecor.exe 112 PID 4268 wrote to memory of 1004 4268 omsecor.exe 112 PID 4268 wrote to memory of 1004 4268 omsecor.exe 112 PID 4268 wrote to memory of 1004 4268 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe"C:\Users\Admin\AppData\Local\Temp\e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exeC:\Users\Admin\AppData\Local\Temp\e1a1b03a866b969f10718ad5a1541a7edde8ebeadfb26c89f3f81c3988e5e69cN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 2568⤵
- Program crash
PID:1612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 2926⤵
- Program crash
PID:3836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 2884⤵
- Program crash
PID:840
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 2282⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2824 -ip 28241⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1428 -ip 14281⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1176 -ip 11761⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4268 -ip 42681⤵PID:4596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d8c0e1c5a971133e0cbe438ffcb30bee
SHA15b3639ad77f2b10c830fd59abef6fb2c115e0bfb
SHA256b630987f421f1e58ec328d6318f95490cce964193368739782bf4707817e03c6
SHA51208af07b11a9d8a078056015813c3827ad81ba154c891399c798c81b6ddf725a9bc5eea9786f9771f30d7b4fcaea40862b10947515dfba5c572a5abb129b10bc3
-
Filesize
96KB
MD57b4ad9bccb0cb5a247cabb3a0926b9f2
SHA1180ba4afa3003b039294a9a505a2e4b5cf07c1d5
SHA25650571071cfb22f09bc0fb0f9f3ee1b2ee096f9c51a7a16f5a23f1b3f0398ca22
SHA512a824cda774f142b05aceab79e1d3e3dc55c41a34d06b32daeadbd357155f1b1a7ab67dcfc3cffe76ae818717ef8458aa6f6017879c32b850489fc9a0302d97c8
-
Filesize
96KB
MD516a74160b82429e6720252e60afc2152
SHA1f694f2632a05ff2839ecf892b81dbdda5a9fd77c
SHA256c88017abef4366976324ac535e86c25e671a1d20ea1426bc8d96ef5b97833b26
SHA512c5516c1519edbe2649864939f29d2eee04c214cee604f4098ccc1b14077e22f9210477c5d3cf594c9f311c2ae25ccbfc842d623a01b6324dbe9e83762f2d82e5