Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 09:24
Static task
static1
Behavioral task
behavioral1
Sample
d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe
Resource
win7-20241010-en
General
-
Target
d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe
-
Size
96KB
-
MD5
471f49e3fe485b7ed02e5a754744f855
-
SHA1
23b95ccf3e5a579680dad54f63148b1a66d7a0f4
-
SHA256
d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636
-
SHA512
bba8483e9704f18381404d1ea94899277bb0c9a5c1dd90725655582674c54d3811b4c4504356611e699c36274d0b75c4e0742b003b65af7126eb840894a041ef
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:vGs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2204 omsecor.exe 2840 omsecor.exe 1252 omsecor.exe 4556 omsecor.exe 2144 omsecor.exe 2100 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2336 set thread context of 3392 2336 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 83 PID 2204 set thread context of 2840 2204 omsecor.exe 88 PID 1252 set thread context of 4556 1252 omsecor.exe 107 PID 2144 set thread context of 2100 2144 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 4536 2336 WerFault.exe 82 1512 2204 WerFault.exe 85 764 1252 WerFault.exe 106 776 2144 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2336 wrote to memory of 3392 2336 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 83 PID 2336 wrote to memory of 3392 2336 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 83 PID 2336 wrote to memory of 3392 2336 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 83 PID 2336 wrote to memory of 3392 2336 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 83 PID 2336 wrote to memory of 3392 2336 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 83 PID 3392 wrote to memory of 2204 3392 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 85 PID 3392 wrote to memory of 2204 3392 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 85 PID 3392 wrote to memory of 2204 3392 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 85 PID 2204 wrote to memory of 2840 2204 omsecor.exe 88 PID 2204 wrote to memory of 2840 2204 omsecor.exe 88 PID 2204 wrote to memory of 2840 2204 omsecor.exe 88 PID 2204 wrote to memory of 2840 2204 omsecor.exe 88 PID 2204 wrote to memory of 2840 2204 omsecor.exe 88 PID 2840 wrote to memory of 1252 2840 omsecor.exe 106 PID 2840 wrote to memory of 1252 2840 omsecor.exe 106 PID 2840 wrote to memory of 1252 2840 omsecor.exe 106 PID 1252 wrote to memory of 4556 1252 omsecor.exe 107 PID 1252 wrote to memory of 4556 1252 omsecor.exe 107 PID 1252 wrote to memory of 4556 1252 omsecor.exe 107 PID 1252 wrote to memory of 4556 1252 omsecor.exe 107 PID 1252 wrote to memory of 4556 1252 omsecor.exe 107 PID 4556 wrote to memory of 2144 4556 omsecor.exe 109 PID 4556 wrote to memory of 2144 4556 omsecor.exe 109 PID 4556 wrote to memory of 2144 4556 omsecor.exe 109 PID 2144 wrote to memory of 2100 2144 omsecor.exe 111 PID 2144 wrote to memory of 2100 2144 omsecor.exe 111 PID 2144 wrote to memory of 2100 2144 omsecor.exe 111 PID 2144 wrote to memory of 2100 2144 omsecor.exe 111 PID 2144 wrote to memory of 2100 2144 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe"C:\Users\Admin\AppData\Local\Temp\d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exeC:\Users\Admin\AppData\Local\Temp\d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 2568⤵
- Program crash
PID:776
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 2926⤵
- Program crash
PID:764
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 2764⤵
- Program crash
PID:1512
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 2882⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2336 -ip 23361⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2204 -ip 22041⤵PID:856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1252 -ip 12521⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2144 -ip 21441⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d2d59ce5b1975057ecd787af12885e60
SHA1dc2d5078e02c327f680c92a038a2fefb0e617c0e
SHA2564e5187481b0bff38a6d63d5f4aeca7bed57ac62ae9434f39e97288229dd221c8
SHA5122aa664806b529e19e6e5ddba47ff3407fd636a7eb949b82dcc8494ce4a7f1692120571ea49940af8936073b446966b9b1222ff9eaef57de8bed98286bbd86e26
-
Filesize
96KB
MD5ca5473505aee2ebe76824260fb993d53
SHA10eade2fe67b31f7ef7878e6bc2ae0803b907cb3e
SHA256a607d8bb3600b1be3af91054a8329ecd5840e02103b72b8e895aff77a99a3f7c
SHA512c2deea8ca874e88059c8bd4d409bf5520da82eb30f8876e8edcf694d52d89eba0967ce8eb5fe906cb8b18aff779c653601dbc40de658f7702500b9016f810b97
-
Filesize
96KB
MD5d423d076b7f1fddd6a5575544eb167b1
SHA156ec25254e3ecb128cf4337d981bcd0b4b23d2eb
SHA25634476c925d054185b31eacc24a715e5a34fef3adecf9e724c5b08c8de267a11d
SHA5129c7170c29adc437af38becd162d75c598e1d9e230ac52335b1c7196e34c7642d6037aae10d62b6a07e2e7ee6756479a843611d03c2549811c2fdd26b8d6a041f