Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 04:42
Static task
static1
Behavioral task
behavioral1
Sample
bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe
Resource
win7-20240903-en
General
-
Target
bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe
-
Size
96KB
-
MD5
786f4f06717e6df31c71a641de88f62d
-
SHA1
317c99ccac218aa62c89f9f5a48eeafee32f7d6c
-
SHA256
bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033
-
SHA512
371b9eed488019d8b27c6769036055463f2990c49d9db23528fbc2fd74ca09dd1968a1147ee8faa1fc28078817dcde9db92abf705fd73ea11baa497d862e52b1
-
SSDEEP
1536:nnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:nGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3728 omsecor.exe 2200 omsecor.exe 3864 omsecor.exe 2444 omsecor.exe 2556 omsecor.exe 516 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3524 set thread context of 2044 3524 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 83 PID 3728 set thread context of 2200 3728 omsecor.exe 88 PID 3864 set thread context of 2444 3864 omsecor.exe 109 PID 2556 set thread context of 516 2556 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3520 3524 WerFault.exe 82 704 3728 WerFault.exe 86 3816 3864 WerFault.exe 108 3016 2556 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3524 wrote to memory of 2044 3524 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 83 PID 3524 wrote to memory of 2044 3524 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 83 PID 3524 wrote to memory of 2044 3524 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 83 PID 3524 wrote to memory of 2044 3524 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 83 PID 3524 wrote to memory of 2044 3524 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 83 PID 2044 wrote to memory of 3728 2044 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 86 PID 2044 wrote to memory of 3728 2044 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 86 PID 2044 wrote to memory of 3728 2044 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 86 PID 3728 wrote to memory of 2200 3728 omsecor.exe 88 PID 3728 wrote to memory of 2200 3728 omsecor.exe 88 PID 3728 wrote to memory of 2200 3728 omsecor.exe 88 PID 3728 wrote to memory of 2200 3728 omsecor.exe 88 PID 3728 wrote to memory of 2200 3728 omsecor.exe 88 PID 2200 wrote to memory of 3864 2200 omsecor.exe 108 PID 2200 wrote to memory of 3864 2200 omsecor.exe 108 PID 2200 wrote to memory of 3864 2200 omsecor.exe 108 PID 3864 wrote to memory of 2444 3864 omsecor.exe 109 PID 3864 wrote to memory of 2444 3864 omsecor.exe 109 PID 3864 wrote to memory of 2444 3864 omsecor.exe 109 PID 3864 wrote to memory of 2444 3864 omsecor.exe 109 PID 3864 wrote to memory of 2444 3864 omsecor.exe 109 PID 2444 wrote to memory of 2556 2444 omsecor.exe 111 PID 2444 wrote to memory of 2556 2444 omsecor.exe 111 PID 2444 wrote to memory of 2556 2444 omsecor.exe 111 PID 2556 wrote to memory of 516 2556 omsecor.exe 113 PID 2556 wrote to memory of 516 2556 omsecor.exe 113 PID 2556 wrote to memory of 516 2556 omsecor.exe 113 PID 2556 wrote to memory of 516 2556 omsecor.exe 113 PID 2556 wrote to memory of 516 2556 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe"C:\Users\Admin\AppData\Local\Temp\bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exeC:\Users\Admin\AppData\Local\Temp\bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 2528⤵
- Program crash
PID:3016
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 2966⤵
- Program crash
PID:3816
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 2884⤵
- Program crash
PID:704
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 2882⤵
- Program crash
PID:3520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3524 -ip 35241⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3728 -ip 37281⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3864 -ip 38641⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2556 -ip 25561⤵PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53457a12e315d2198098682eda4c26ac7
SHA17802d8d039752f7922da1c7837c1596bdd92af0f
SHA256fa1d389ba5fdea6b427f05e15d18b654abe27d997bddb08eb77d1218069c9328
SHA512da933d40174c1e719a5c37837c2f229798364a24114f668dbbbcf7907006f2dd89158e50b6397984131e471561cca6034d4845d4e748764a56f7beda75884cf5
-
Filesize
96KB
MD5b4f488426361b370a90ce94df315ce49
SHA16f0b2505c0c5fa09c08ed9b2db445f1620a83c26
SHA256bf7a20aed9ed88c4ffaf0d235217b98dc5abb4e12ebd2e0c2fc8cfa9baa3b908
SHA51212375a544d6149ae0d8047d0cba8082d642450a80738a9c6883a07cfd42562e999f0ca2eb10697952099c745300350ebca725271979591dcb992e9d3a98571f3
-
Filesize
96KB
MD5f380d38557fcea077ed5120ef57a8fc5
SHA16b000eccf634e9736111fe191f0a40642f362bfe
SHA2563cdbb516316a69521c13f025e3e01f5f6adfa7501499947481cb05a6a09ec869
SHA5127f25d8b2a5a5bca19a0ee6a9c144b4e363a46247f9754d82e6e1a1dcad47b92cb842920ac104a7944fe734a6b09a2a1203c0f782caf1d9817772fc3a07884e03