Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe
Resource
win7-20240729-en
General
-
Target
fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe
-
Size
96KB
-
MD5
fae8a07b6d4983746602b7ec8082db35
-
SHA1
200702a5331d4c705f69621105e7e6170e47d046
-
SHA256
fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d
-
SHA512
a9c8a9183cdafeae5e96db5bcca2b9f7b7135dbb6e0f2efb2c1e7dffee8dc5d3e7a6933d4f9846066ada01169d04622a9d9537c6148e7c823ac339a1e6e7a260
-
SSDEEP
1536:OnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxD:OGs8cd8eXlYairZYqMddH13D
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1008 omsecor.exe 1504 omsecor.exe 3908 omsecor.exe 640 omsecor.exe 4616 omsecor.exe 4044 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3672 set thread context of 1720 3672 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 84 PID 1008 set thread context of 1504 1008 omsecor.exe 90 PID 3908 set thread context of 640 3908 omsecor.exe 116 PID 4616 set thread context of 4044 4616 omsecor.exe 120 -
Program crash 4 IoCs
pid pid_target Process procid_target 3564 3672 WerFault.exe 83 1388 1008 WerFault.exe 88 3620 3908 WerFault.exe 115 396 4616 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3672 wrote to memory of 1720 3672 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 84 PID 3672 wrote to memory of 1720 3672 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 84 PID 3672 wrote to memory of 1720 3672 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 84 PID 3672 wrote to memory of 1720 3672 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 84 PID 3672 wrote to memory of 1720 3672 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 84 PID 1720 wrote to memory of 1008 1720 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 88 PID 1720 wrote to memory of 1008 1720 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 88 PID 1720 wrote to memory of 1008 1720 fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe 88 PID 1008 wrote to memory of 1504 1008 omsecor.exe 90 PID 1008 wrote to memory of 1504 1008 omsecor.exe 90 PID 1008 wrote to memory of 1504 1008 omsecor.exe 90 PID 1008 wrote to memory of 1504 1008 omsecor.exe 90 PID 1008 wrote to memory of 1504 1008 omsecor.exe 90 PID 1504 wrote to memory of 3908 1504 omsecor.exe 115 PID 1504 wrote to memory of 3908 1504 omsecor.exe 115 PID 1504 wrote to memory of 3908 1504 omsecor.exe 115 PID 3908 wrote to memory of 640 3908 omsecor.exe 116 PID 3908 wrote to memory of 640 3908 omsecor.exe 116 PID 3908 wrote to memory of 640 3908 omsecor.exe 116 PID 3908 wrote to memory of 640 3908 omsecor.exe 116 PID 3908 wrote to memory of 640 3908 omsecor.exe 116 PID 640 wrote to memory of 4616 640 omsecor.exe 118 PID 640 wrote to memory of 4616 640 omsecor.exe 118 PID 640 wrote to memory of 4616 640 omsecor.exe 118 PID 4616 wrote to memory of 4044 4616 omsecor.exe 120 PID 4616 wrote to memory of 4044 4616 omsecor.exe 120 PID 4616 wrote to memory of 4044 4616 omsecor.exe 120 PID 4616 wrote to memory of 4044 4616 omsecor.exe 120 PID 4616 wrote to memory of 4044 4616 omsecor.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe"C:\Users\Admin\AppData\Local\Temp\fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exeC:\Users\Admin\AppData\Local\Temp\fcc463783421288a64d9504a5da80ff3f19d7dc994b35311403fe33cac412c9d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4616 -s 2448⤵
- Program crash
PID:396
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 2926⤵
- Program crash
PID:3620
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 2884⤵
- Program crash
PID:1388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 3002⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3672 -ip 36721⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1008 -ip 10081⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3908 -ip 39081⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4616 -ip 46161⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5109afd6d318991968556e56a4be20486
SHA1400d9862337d7cd6d78267ff3480aaec337272a5
SHA256fcf9ef3ec9050afaeb609dfba586851c0615fab2127daadf4f3d2198d1e0ded4
SHA51231369363a24a4b59946b8e0ea51bd998601467501f0ebdfcf0b651078640d21669f6ab588fc6ea30123a3de37272a47fb9b4f5b45d7d1bd6da6a9fd6c6d0853c
-
Filesize
96KB
MD5391e74d5b7aa9a298276ceabb1e5e566
SHA1fab540db25478a652313a22528581ee657e63e16
SHA2569703514741527b7659d550b60738171f968d47ce303bce0bb210fb6c1c0e857b
SHA512e45daa9380901b08eed25d5b8c430595fbe7f71de6cd5eeca49220f54b71a62f25f9c24cd853a460be121fd002f8f414772302155d80f86887e08219488594b1
-
Filesize
96KB
MD5b6ed50aab8ace8bcab85732ec564785c
SHA1813ccc651c9c458702ab3cb301fd9e7053b3a705
SHA25643303c92850f657577f12dd42a9e7c16a26cce6fd6d431e616911672de47974b
SHA5128bbe8fe05d13551248d95b900fd21699fa5fb9cc25bae8378630162067f7b60c40afb39686189ede24eeef8f8372b21042ba96289a02677a31124040d9528817