Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 05:00
Static task
static1
Behavioral task
behavioral1
Sample
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe
Resource
win7-20240903-en
General
-
Target
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe
-
Size
96KB
-
MD5
78218d41fd66e7e6cadd47af577f71e1
-
SHA1
aa8a7ded8287b189a1a6cf82fbce6f71b6bcd688
-
SHA256
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88
-
SHA512
7ec64b25ef5db3a3070b663c4f46b87daa54a54624ceeda1644e09e8ba6cec2c45c7d7d02920d522ff8c1dadcc11e127f7eb4aecc9c03c1e1e182dd3e02539a3
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:zGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2376 omsecor.exe 4580 omsecor.exe 1644 omsecor.exe 400 omsecor.exe 1668 omsecor.exe 2372 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1208 set thread context of 3264 1208 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 2376 set thread context of 4580 2376 omsecor.exe 87 PID 1644 set thread context of 400 1644 omsecor.exe 100 PID 1668 set thread context of 2372 1668 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 2012 1208 WerFault.exe 81 2896 2376 WerFault.exe 84 4032 1644 WerFault.exe 99 4984 1668 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1208 wrote to memory of 3264 1208 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 1208 wrote to memory of 3264 1208 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 1208 wrote to memory of 3264 1208 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 1208 wrote to memory of 3264 1208 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 1208 wrote to memory of 3264 1208 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 3264 wrote to memory of 2376 3264 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 84 PID 3264 wrote to memory of 2376 3264 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 84 PID 3264 wrote to memory of 2376 3264 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 84 PID 2376 wrote to memory of 4580 2376 omsecor.exe 87 PID 2376 wrote to memory of 4580 2376 omsecor.exe 87 PID 2376 wrote to memory of 4580 2376 omsecor.exe 87 PID 2376 wrote to memory of 4580 2376 omsecor.exe 87 PID 2376 wrote to memory of 4580 2376 omsecor.exe 87 PID 4580 wrote to memory of 1644 4580 omsecor.exe 99 PID 4580 wrote to memory of 1644 4580 omsecor.exe 99 PID 4580 wrote to memory of 1644 4580 omsecor.exe 99 PID 1644 wrote to memory of 400 1644 omsecor.exe 100 PID 1644 wrote to memory of 400 1644 omsecor.exe 100 PID 1644 wrote to memory of 400 1644 omsecor.exe 100 PID 1644 wrote to memory of 400 1644 omsecor.exe 100 PID 1644 wrote to memory of 400 1644 omsecor.exe 100 PID 400 wrote to memory of 1668 400 omsecor.exe 102 PID 400 wrote to memory of 1668 400 omsecor.exe 102 PID 400 wrote to memory of 1668 400 omsecor.exe 102 PID 1668 wrote to memory of 2372 1668 omsecor.exe 103 PID 1668 wrote to memory of 2372 1668 omsecor.exe 103 PID 1668 wrote to memory of 2372 1668 omsecor.exe 103 PID 1668 wrote to memory of 2372 1668 omsecor.exe 103 PID 1668 wrote to memory of 2372 1668 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe"C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exeC:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 2688⤵
- Program crash
PID:4984
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 2926⤵
- Program crash
PID:4032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 3004⤵
- Program crash
PID:2896
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 2882⤵
- Program crash
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1208 -ip 12081⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2376 -ip 23761⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1644 -ip 16441⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1668 -ip 16681⤵PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5de15dcf32241852c2dbc133f6860052b
SHA1d62e94bde2c32c8d2f4c0c6362f53d89b6d245c4
SHA256830980b0e36b3a30e8f0467fd31f97acdd71b51eca1124ea1d16786b573d2a70
SHA5126929ceef0f8644fb670a8834f6766f5e87ce07d28b8eeae4b871664793bbdcbe6dbada8d960ef758af20551f389699c71de3fb520ec617c90b853d173fb4352b
-
Filesize
96KB
MD5eec076cdc82f43b08d721f79500c8074
SHA19a6a6d9faef3e11b970f4e14c47f84384c36fafc
SHA2563041bd8a974b30bc48fe113ea23488d0a1fdaadaf2a95bbfd9fb0e4c6c97c7e5
SHA51233f5c6fbeb43e7554c430a539bed59c6c763cd9106bc31e6d80414c11a1404f2b10514828073ad8233f4070b6766c9636b929fbc72dfab6561a2bd975c114a56
-
Filesize
96KB
MD56bf2f9d529618cb42b7a63bf4f58cb0b
SHA1192ffb196db7c590b2cfe78cf4085bb93df9d26e
SHA256dd49f3ad67a168027701202a5e8cf59e6d57caf87a919c0f5d94c1f5df4dc075
SHA512b652bc1585d0bc3dcb88dd946ddecce80e6cdde29a0e56a6c75ee67b64828515d775ba0ca15b71bca35006e64cf737495506ca141c606f92191bd6438fe62323