Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 19:25
Static task
static1
Behavioral task
behavioral1
Sample
61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe
Resource
win7-20240903-en
General
-
Target
61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe
-
Size
96KB
-
MD5
af489875957b7980de9e7b9e657c6c20
-
SHA1
6e7dd8707e18624e41a4d2f57da6d905d940c970
-
SHA256
61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2
-
SHA512
e453687d958a9895b6f82bc221ff5ac7346c2a5175003c213d561a2306995e16a45b6ca2b282807a717abe4dd7ac749b262f73346157400f25d07a30cd38d72a
-
SSDEEP
1536:OnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:OGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 428 omsecor.exe 4496 omsecor.exe 4636 omsecor.exe 2260 omsecor.exe 4300 omsecor.exe 3564 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5048 set thread context of 4788 5048 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 85 PID 428 set thread context of 4496 428 omsecor.exe 91 PID 4636 set thread context of 2260 4636 omsecor.exe 110 PID 4300 set thread context of 3564 4300 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 1772 5048 WerFault.exe 5008 428 WerFault.exe 2108 4636 WerFault.exe 109 3272 4300 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5048 wrote to memory of 4788 5048 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 85 PID 5048 wrote to memory of 4788 5048 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 85 PID 5048 wrote to memory of 4788 5048 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 85 PID 5048 wrote to memory of 4788 5048 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 85 PID 5048 wrote to memory of 4788 5048 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 85 PID 4788 wrote to memory of 428 4788 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 89 PID 4788 wrote to memory of 428 4788 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 89 PID 4788 wrote to memory of 428 4788 61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe 89 PID 428 wrote to memory of 4496 428 omsecor.exe 91 PID 428 wrote to memory of 4496 428 omsecor.exe 91 PID 428 wrote to memory of 4496 428 omsecor.exe 91 PID 428 wrote to memory of 4496 428 omsecor.exe 91 PID 428 wrote to memory of 4496 428 omsecor.exe 91 PID 4496 wrote to memory of 4636 4496 omsecor.exe 109 PID 4496 wrote to memory of 4636 4496 omsecor.exe 109 PID 4496 wrote to memory of 4636 4496 omsecor.exe 109 PID 4636 wrote to memory of 2260 4636 omsecor.exe 110 PID 4636 wrote to memory of 2260 4636 omsecor.exe 110 PID 4636 wrote to memory of 2260 4636 omsecor.exe 110 PID 4636 wrote to memory of 2260 4636 omsecor.exe 110 PID 4636 wrote to memory of 2260 4636 omsecor.exe 110 PID 2260 wrote to memory of 4300 2260 omsecor.exe 112 PID 2260 wrote to memory of 4300 2260 omsecor.exe 112 PID 2260 wrote to memory of 4300 2260 omsecor.exe 112 PID 4300 wrote to memory of 3564 4300 omsecor.exe 114 PID 4300 wrote to memory of 3564 4300 omsecor.exe 114 PID 4300 wrote to memory of 3564 4300 omsecor.exe 114 PID 4300 wrote to memory of 3564 4300 omsecor.exe 114 PID 4300 wrote to memory of 3564 4300 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe"C:\Users\Admin\AppData\Local\Temp\61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exeC:\Users\Admin\AppData\Local\Temp\61e75d951ba642fc057bb7b0b97fa0f4a63fe6dfb277080b33b1209048cc6dc2N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 2448⤵
- Program crash
PID:3272
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 2926⤵
- Program crash
PID:2108
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 2884⤵
- Program crash
PID:5008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 2922⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5048 -ip 50481⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 428 -ip 4281⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4636 -ip 46361⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4300 -ip 43001⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD527f12c55f5c045eb25f507b398f93861
SHA10a2254f9e1b26b824695ed0c4da2846133265773
SHA25637b2787fddca3cd83baea306d2b3b77be0ee00f670070dd09b8a8bc2e5b0da62
SHA5128d87e78bff96014a5ec8c7587e4b13a251295816099987ee0b91c1eca7dfad647c6957e082103c6cd8056e8885f891e58b642e8851ca76a3da5904570b2a9c42
-
Filesize
96KB
MD5eae95d5004013b62c953c44d479c3c21
SHA1b1f9f15ab9c5bee7dedd7e567faa24a0aada7629
SHA256ebc820e0155900005907e9acedc3d8db1ab2d583beae9baded8fb4014236ff01
SHA5124a255e49bc70002baead4c85831ca056cf6548e89f54f96f910310707a1ececb6d0d89e3cb487febbb30550582d10fb4a6f9bfa7b5a94456a3ff62a5ee2791fd
-
Filesize
96KB
MD560ed70f48c2d40508e3665ccdce2422d
SHA13df202c2c28a9156e89ea47d56e34b87b94982ba
SHA256cbfb4c9544d8ced24e10fe0693afaae8ee20106eebc09f70ab534d3b62b114b6
SHA51227fdf003644ce7759f40c4aa9e4549b2c5d23b0af5bc30cc066c993ac68dc6d8b1713bb34cb5331c7e9e56313b2fcf18944f3092fb5aa9daf6dbf0637b69a64a