Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 07:20
Static task
static1
Behavioral task
behavioral1
Sample
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe
Resource
win7-20240903-en
General
-
Target
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe
-
Size
96KB
-
MD5
606343d6951c53f2035ed0d62ba8c618
-
SHA1
cd2dd8d2ad3fa6dbf282b61046b4209ee70b8d5f
-
SHA256
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99
-
SHA512
6a06c41361d0c21dc652a0821855c1c45c210078f68ff306e403b56d133b2ff7565c67de78c4f70195adefe26fdc9cbf5df831783766e8b513b5ea33b7cf3478
-
SSDEEP
1536:3nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:3Gs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4620 omsecor.exe 872 omsecor.exe 3296 omsecor.exe 1956 omsecor.exe 3476 omsecor.exe 3540 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3284 set thread context of 2592 3284 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 4620 set thread context of 872 4620 omsecor.exe 88 PID 3296 set thread context of 1956 3296 omsecor.exe 110 PID 3476 set thread context of 3540 3476 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 3832 3284 WerFault.exe 82 4212 4620 WerFault.exe 85 3480 3296 WerFault.exe 109 4372 3476 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3284 wrote to memory of 2592 3284 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3284 wrote to memory of 2592 3284 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3284 wrote to memory of 2592 3284 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3284 wrote to memory of 2592 3284 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3284 wrote to memory of 2592 3284 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 2592 wrote to memory of 4620 2592 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 85 PID 2592 wrote to memory of 4620 2592 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 85 PID 2592 wrote to memory of 4620 2592 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 85 PID 4620 wrote to memory of 872 4620 omsecor.exe 88 PID 4620 wrote to memory of 872 4620 omsecor.exe 88 PID 4620 wrote to memory of 872 4620 omsecor.exe 88 PID 4620 wrote to memory of 872 4620 omsecor.exe 88 PID 4620 wrote to memory of 872 4620 omsecor.exe 88 PID 872 wrote to memory of 3296 872 omsecor.exe 109 PID 872 wrote to memory of 3296 872 omsecor.exe 109 PID 872 wrote to memory of 3296 872 omsecor.exe 109 PID 3296 wrote to memory of 1956 3296 omsecor.exe 110 PID 3296 wrote to memory of 1956 3296 omsecor.exe 110 PID 3296 wrote to memory of 1956 3296 omsecor.exe 110 PID 3296 wrote to memory of 1956 3296 omsecor.exe 110 PID 3296 wrote to memory of 1956 3296 omsecor.exe 110 PID 1956 wrote to memory of 3476 1956 omsecor.exe 112 PID 1956 wrote to memory of 3476 1956 omsecor.exe 112 PID 1956 wrote to memory of 3476 1956 omsecor.exe 112 PID 3476 wrote to memory of 3540 3476 omsecor.exe 114 PID 3476 wrote to memory of 3540 3476 omsecor.exe 114 PID 3476 wrote to memory of 3540 3476 omsecor.exe 114 PID 3476 wrote to memory of 3540 3476 omsecor.exe 114 PID 3476 wrote to memory of 3540 3476 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe"C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exeC:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 2568⤵
- Program crash
PID:4372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 2966⤵
- Program crash
PID:3480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 2724⤵
- Program crash
PID:4212
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 2922⤵
- Program crash
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3284 -ip 32841⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4620 -ip 46201⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3296 -ip 32961⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3476 -ip 34761⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55d7265e372cdeced608702e564f4ec04
SHA1bd8aa50bb778b201a6896ac8ab16cebb9ad2a541
SHA256ea3ac0d3c28dcc0d8104a084d245ed3cb1bdf66c4b3fefa9eb01cbbf5616e41d
SHA512d5ad65041a37aa328c8629bda299dd631bb9c864457fa73775465cb298e3e3830ec5d8f3751cd012390cb0e3c0caa206c16404f564e89607ca4faa605df175d7
-
Filesize
96KB
MD52f21ddcb3b74b8fef02ab6bcd12a70a7
SHA180e3e6070bd26b46cd745193a67b7bf3f4f5925e
SHA256775d1989558c854244fe8943b6d77122fb51126a2be888a0f920365ad2e6f4d5
SHA51234b806b6fd70b6e4f31a46757c2bbe29528c22f3197217d195cf3ed37b532ad53c3a08269786c3d8deb9bb9a98b0a3975984db1e35cb0296a91f00e7a29f10e1
-
Filesize
96KB
MD5f6839d9475b98651996ab19e63f29c21
SHA153085c336117d0601a1b8a842282f6773baa7abb
SHA256c55932d8251296b0023c29eaa64763aabddf8e0e2d12d46e59f84a534d663b27
SHA5121905799baea6f0c98cf6745582ddd2df827a4144cb0e538d995d13e9de3710eaa74b6a7b70018a71db44252ff64580da01833c1b2ffc9024c32f453db5954a6c