Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 06:55
Static task
static1
Behavioral task
behavioral1
Sample
b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe
Resource
win7-20240708-en
General
-
Target
b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe
-
Size
96KB
-
MD5
e1b93335be80e38d60faa0995501b964
-
SHA1
a3ad93a38cd65ac73a57e68a2c87e2ff16a509ed
-
SHA256
b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27
-
SHA512
cd0832b92998c34487b4c60b2e4cc66a59e719a14b857bf3b56af43fefcb1ec31bb33b7c3dff7edea574c6a594878360ec47f57a61cdeb6c404bf6d3505e4867
-
SSDEEP
1536:1nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:1Gs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1908 omsecor.exe 1672 omsecor.exe 4628 omsecor.exe 1608 omsecor.exe 2300 omsecor.exe 3532 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3076 set thread context of 1152 3076 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 82 PID 1908 set thread context of 1672 1908 omsecor.exe 87 PID 4628 set thread context of 1608 4628 omsecor.exe 100 PID 2300 set thread context of 3532 2300 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 432 3076 WerFault.exe 81 624 1908 WerFault.exe 85 2220 4628 WerFault.exe 99 4320 2300 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3076 wrote to memory of 1152 3076 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 82 PID 3076 wrote to memory of 1152 3076 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 82 PID 3076 wrote to memory of 1152 3076 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 82 PID 3076 wrote to memory of 1152 3076 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 82 PID 3076 wrote to memory of 1152 3076 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 82 PID 1152 wrote to memory of 1908 1152 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 85 PID 1152 wrote to memory of 1908 1152 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 85 PID 1152 wrote to memory of 1908 1152 b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe 85 PID 1908 wrote to memory of 1672 1908 omsecor.exe 87 PID 1908 wrote to memory of 1672 1908 omsecor.exe 87 PID 1908 wrote to memory of 1672 1908 omsecor.exe 87 PID 1908 wrote to memory of 1672 1908 omsecor.exe 87 PID 1908 wrote to memory of 1672 1908 omsecor.exe 87 PID 1672 wrote to memory of 4628 1672 omsecor.exe 99 PID 1672 wrote to memory of 4628 1672 omsecor.exe 99 PID 1672 wrote to memory of 4628 1672 omsecor.exe 99 PID 4628 wrote to memory of 1608 4628 omsecor.exe 100 PID 4628 wrote to memory of 1608 4628 omsecor.exe 100 PID 4628 wrote to memory of 1608 4628 omsecor.exe 100 PID 4628 wrote to memory of 1608 4628 omsecor.exe 100 PID 4628 wrote to memory of 1608 4628 omsecor.exe 100 PID 1608 wrote to memory of 2300 1608 omsecor.exe 102 PID 1608 wrote to memory of 2300 1608 omsecor.exe 102 PID 1608 wrote to memory of 2300 1608 omsecor.exe 102 PID 2300 wrote to memory of 3532 2300 omsecor.exe 104 PID 2300 wrote to memory of 3532 2300 omsecor.exe 104 PID 2300 wrote to memory of 3532 2300 omsecor.exe 104 PID 2300 wrote to memory of 3532 2300 omsecor.exe 104 PID 2300 wrote to memory of 3532 2300 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe"C:\Users\Admin\AppData\Local\Temp\b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exeC:\Users\Admin\AppData\Local\Temp\b6f4480086f4978357faae02c63e9962dc5e576e854939f9f5ebe4c0d280bd27.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 2568⤵
- Program crash
PID:4320
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 2926⤵
- Program crash
PID:2220
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 2724⤵
- Program crash
PID:624
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 2882⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3076 -ip 30761⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1908 -ip 19081⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4628 -ip 46281⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2300 -ip 23001⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57140a8cf9778411372ec7a83fafa3527
SHA1f6581a691dcd3627e2af5a7fc79434247173998c
SHA256317a770d818b2e273aadcfed0722bfe709b7f48be71fb5ec58690b552b5a563c
SHA5127d5c3a59a6037d3794853c85866b28f123cf92ec230d711dd2dbd0d8a41628cfe09440df739bb1341396cedb3d0de89c2b988c667efe9274da6e814608e5d506
-
Filesize
96KB
MD500f5c849a831e0374558bf4b0d08c3e6
SHA1b947f5505795b1bec862ddaa43a704f31cf1c889
SHA2566a44614d9af5900ec8284894d2366ba3241e740a8fffb3da68ad4e66f6b8be65
SHA5125efad890e869a603e140535b1351cf391f9ef0b0dbf5bbe71f65c0bee9e9c0b7cab3e78b2e34068c70c5fb2fd1fc19d8c4840bf4eb0732a309d53f302e7d6272
-
Filesize
96KB
MD55685b568d777fd0e0cb6403dce540c42
SHA1853547ea38018e6ed086dc871acf4c72e4e23d25
SHA25600e4945bd7818ce81300ba24633a2871f21f08283c56da4f6345117982bf7d5f
SHA512edff8bff7e912a353f647c7709504908b0d3261222232e4ab88832f6d913a38469d41eec7fe02838e281f01cb3f4e5a81c41551246f6326d74511dcc96252ad2