Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 07:04
Static task
static1
Behavioral task
behavioral1
Sample
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe
Resource
win7-20240708-en
General
-
Target
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe
-
Size
96KB
-
MD5
606343d6951c53f2035ed0d62ba8c618
-
SHA1
cd2dd8d2ad3fa6dbf282b61046b4209ee70b8d5f
-
SHA256
b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99
-
SHA512
6a06c41361d0c21dc652a0821855c1c45c210078f68ff306e403b56d133b2ff7565c67de78c4f70195adefe26fdc9cbf5df831783766e8b513b5ea33b7cf3478
-
SSDEEP
1536:3nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:3Gs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3596 omsecor.exe 3544 omsecor.exe 1656 omsecor.exe 3972 omsecor.exe 4136 omsecor.exe 2972 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3152 set thread context of 552 3152 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3596 set thread context of 3544 3596 omsecor.exe 87 PID 1656 set thread context of 3972 1656 omsecor.exe 107 PID 4136 set thread context of 2972 4136 omsecor.exe 110 -
Program crash 4 IoCs
pid pid_target Process procid_target 1964 3152 WerFault.exe 82 3040 3596 WerFault.exe 85 376 1656 WerFault.exe 106 4336 4136 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3152 wrote to memory of 552 3152 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3152 wrote to memory of 552 3152 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3152 wrote to memory of 552 3152 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3152 wrote to memory of 552 3152 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 3152 wrote to memory of 552 3152 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 83 PID 552 wrote to memory of 3596 552 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 85 PID 552 wrote to memory of 3596 552 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 85 PID 552 wrote to memory of 3596 552 b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe 85 PID 3596 wrote to memory of 3544 3596 omsecor.exe 87 PID 3596 wrote to memory of 3544 3596 omsecor.exe 87 PID 3596 wrote to memory of 3544 3596 omsecor.exe 87 PID 3596 wrote to memory of 3544 3596 omsecor.exe 87 PID 3596 wrote to memory of 3544 3596 omsecor.exe 87 PID 3544 wrote to memory of 1656 3544 omsecor.exe 106 PID 3544 wrote to memory of 1656 3544 omsecor.exe 106 PID 3544 wrote to memory of 1656 3544 omsecor.exe 106 PID 1656 wrote to memory of 3972 1656 omsecor.exe 107 PID 1656 wrote to memory of 3972 1656 omsecor.exe 107 PID 1656 wrote to memory of 3972 1656 omsecor.exe 107 PID 1656 wrote to memory of 3972 1656 omsecor.exe 107 PID 1656 wrote to memory of 3972 1656 omsecor.exe 107 PID 3972 wrote to memory of 4136 3972 omsecor.exe 109 PID 3972 wrote to memory of 4136 3972 omsecor.exe 109 PID 3972 wrote to memory of 4136 3972 omsecor.exe 109 PID 4136 wrote to memory of 2972 4136 omsecor.exe 110 PID 4136 wrote to memory of 2972 4136 omsecor.exe 110 PID 4136 wrote to memory of 2972 4136 omsecor.exe 110 PID 4136 wrote to memory of 2972 4136 omsecor.exe 110 PID 4136 wrote to memory of 2972 4136 omsecor.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe"C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exeC:\Users\Admin\AppData\Local\Temp\b939988d47f843e3ab8a126eda09a99eb91c95c8b8ccba952ab2dbb142557f99.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 2688⤵
- Program crash
PID:4336
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 2926⤵
- Program crash
PID:376
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 2964⤵
- Program crash
PID:3040
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 3002⤵
- Program crash
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3152 -ip 31521⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3596 -ip 35961⤵PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1656 -ip 16561⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4136 -ip 41361⤵PID:1756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5760ddb0920a0e51047ba33156a839fc1
SHA15458c9b174dc4914c68d551649dd293fd6a034e9
SHA256bd87ab899e27523b3bfae0226b054c6dd6622cf5b124056f1480f0edbbef7446
SHA512e57c90ced0a9b882c212ce1cc5590b6ee34a18ff6215b7482679e3cf054d2980cec6410fb3cdcfc81df3c7a69cd2a23ed41c67301e0d3b5c4ff959812b7511b2
-
Filesize
96KB
MD52f21ddcb3b74b8fef02ab6bcd12a70a7
SHA180e3e6070bd26b46cd745193a67b7bf3f4f5925e
SHA256775d1989558c854244fe8943b6d77122fb51126a2be888a0f920365ad2e6f4d5
SHA51234b806b6fd70b6e4f31a46757c2bbe29528c22f3197217d195cf3ed37b532ad53c3a08269786c3d8deb9bb9a98b0a3975984db1e35cb0296a91f00e7a29f10e1
-
Filesize
96KB
MD58f3dc91d5af614cc9fe4673c9d769a49
SHA1275c9d4e3ba3e150afc4b95f3b335f27df7a3698
SHA2569005c2013bbfd1a2f0272bcac9e434e65ade9be807b75d53c1d87eff36878725
SHA512effa02ea2bc3829a577c609a7c81d9a7727b3b66b5581d1b69f9f924f11f1256f5f1fc2a9b2d1be23f7d1dfd851ae8c2474f5b63134a69e1aa32350a5f43cf9e