Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2025, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe
Resource
win7-20241010-en
General
-
Target
a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe
-
Size
96KB
-
MD5
b2ff87546ca464dc1f535d7794c2e568
-
SHA1
c20292bd2d72021d41514e77880d27232c2f2065
-
SHA256
a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d
-
SHA512
24759c0481c8aedf1210054a5205bbabbb8c058706864fd268976fdfd4a6f4cf4180cddcd5b7b9cd5a508ea27a24d37c8fb502d70d12c0625af226fffe600725
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxJ:xGs8cd8eXlYairZYqMddH13J
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4432 omsecor.exe 4996 omsecor.exe 5044 omsecor.exe 1592 omsecor.exe 4620 omsecor.exe 4984 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2288 set thread context of 3472 2288 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 85 PID 4432 set thread context of 4996 4432 omsecor.exe 89 PID 5044 set thread context of 1592 5044 omsecor.exe 114 PID 4620 set thread context of 4984 4620 omsecor.exe 118 -
Program crash 4 IoCs
pid pid_target Process procid_target 3944 2288 WerFault.exe 84 5108 4432 WerFault.exe 87 2432 5044 WerFault.exe 113 4788 4620 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2288 wrote to memory of 3472 2288 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 85 PID 2288 wrote to memory of 3472 2288 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 85 PID 2288 wrote to memory of 3472 2288 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 85 PID 2288 wrote to memory of 3472 2288 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 85 PID 2288 wrote to memory of 3472 2288 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 85 PID 3472 wrote to memory of 4432 3472 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 87 PID 3472 wrote to memory of 4432 3472 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 87 PID 3472 wrote to memory of 4432 3472 a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe 87 PID 4432 wrote to memory of 4996 4432 omsecor.exe 89 PID 4432 wrote to memory of 4996 4432 omsecor.exe 89 PID 4432 wrote to memory of 4996 4432 omsecor.exe 89 PID 4432 wrote to memory of 4996 4432 omsecor.exe 89 PID 4432 wrote to memory of 4996 4432 omsecor.exe 89 PID 4996 wrote to memory of 5044 4996 omsecor.exe 113 PID 4996 wrote to memory of 5044 4996 omsecor.exe 113 PID 4996 wrote to memory of 5044 4996 omsecor.exe 113 PID 5044 wrote to memory of 1592 5044 omsecor.exe 114 PID 5044 wrote to memory of 1592 5044 omsecor.exe 114 PID 5044 wrote to memory of 1592 5044 omsecor.exe 114 PID 5044 wrote to memory of 1592 5044 omsecor.exe 114 PID 5044 wrote to memory of 1592 5044 omsecor.exe 114 PID 1592 wrote to memory of 4620 1592 omsecor.exe 116 PID 1592 wrote to memory of 4620 1592 omsecor.exe 116 PID 1592 wrote to memory of 4620 1592 omsecor.exe 116 PID 4620 wrote to memory of 4984 4620 omsecor.exe 118 PID 4620 wrote to memory of 4984 4620 omsecor.exe 118 PID 4620 wrote to memory of 4984 4620 omsecor.exe 118 PID 4620 wrote to memory of 4984 4620 omsecor.exe 118 PID 4620 wrote to memory of 4984 4620 omsecor.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe"C:\Users\Admin\AppData\Local\Temp\a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exeC:\Users\Admin\AppData\Local\Temp\a661df1f7438dac5d67caccb49ad394bed40737bff41cfd73c167c0070aff94d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 2608⤵
- Program crash
PID:4788
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 2966⤵
- Program crash
PID:2432
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 2884⤵
- Program crash
PID:5108
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 2882⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2288 -ip 22881⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4432 -ip 44321⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5044 -ip 50441⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4620 -ip 46201⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53a91d282f2e5f6fe6c823073200ebdba
SHA1b4eef5209bb4fc28900b29bcdb4b7395d1b5f8c0
SHA256e1be6b3319ebe58890935c4585b5bc94c7fd65cf9b9e49df47b87c47d708a331
SHA51266595e23868559676c46c96b9bc3a4be634406ac2f438730cfd889292a8b1507f31694119e58ca03ff5bbf7cb844a5d78bd87bd077262515e1466fb6191944da
-
Filesize
96KB
MD5b680aff7c5eb7d61b7b65647b98a98b0
SHA1993451bf1f0e83beafd84fffbaed179989c3e2e3
SHA25627fc27d7f892045cb9eab70f457701b47fa1279bc19c6bb23f49336ebaa1c0e6
SHA512357299e68124e88f56be79919847200448b8cc53b73cc2bdbe1fb2809b18a989ebea6383cd9ec1aced58f63d619e5316e1ec9852ffbce8aaa04b8d54798a9e8d
-
Filesize
96KB
MD597699a43fbb8a5f94cee99da549f2acb
SHA1fbda85f14814778ed7fde4a4d4b4fc82ca024837
SHA256561e95db1bd218ba19e558512e1978ab8f882a6feac1322e484e9b41bc818903
SHA5122fbf7dba9310d91e6dbb10f77922349bf546bc15374c8367eea1a25fc1d5aa586c33abfbceec5ef98c1e31aff965f8b8c795fd6e1ab23b087e3161b1710f68dc