Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:53
Static task
static1
Behavioral task
behavioral1
Sample
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe
Resource
win7-20240903-en
General
-
Target
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe
-
Size
96KB
-
MD5
78218d41fd66e7e6cadd47af577f71e1
-
SHA1
aa8a7ded8287b189a1a6cf82fbce6f71b6bcd688
-
SHA256
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88
-
SHA512
7ec64b25ef5db3a3070b663c4f46b87daa54a54624ceeda1644e09e8ba6cec2c45c7d7d02920d522ff8c1dadcc11e127f7eb4aecc9c03c1e1e182dd3e02539a3
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:zGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4344 omsecor.exe 2116 omsecor.exe 1964 omsecor.exe 1368 omsecor.exe 1072 omsecor.exe 4828 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4588 set thread context of 2744 4588 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 4344 set thread context of 2116 4344 omsecor.exe 87 PID 1964 set thread context of 1368 1964 omsecor.exe 100 PID 1072 set thread context of 4828 1072 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2768 4588 WerFault.exe 81 2584 4344 WerFault.exe 84 1576 1964 WerFault.exe 99 2292 1072 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2744 4588 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 4588 wrote to memory of 2744 4588 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 4588 wrote to memory of 2744 4588 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 4588 wrote to memory of 2744 4588 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 4588 wrote to memory of 2744 4588 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 82 PID 2744 wrote to memory of 4344 2744 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 84 PID 2744 wrote to memory of 4344 2744 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 84 PID 2744 wrote to memory of 4344 2744 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 84 PID 4344 wrote to memory of 2116 4344 omsecor.exe 87 PID 4344 wrote to memory of 2116 4344 omsecor.exe 87 PID 4344 wrote to memory of 2116 4344 omsecor.exe 87 PID 4344 wrote to memory of 2116 4344 omsecor.exe 87 PID 4344 wrote to memory of 2116 4344 omsecor.exe 87 PID 2116 wrote to memory of 1964 2116 omsecor.exe 99 PID 2116 wrote to memory of 1964 2116 omsecor.exe 99 PID 2116 wrote to memory of 1964 2116 omsecor.exe 99 PID 1964 wrote to memory of 1368 1964 omsecor.exe 100 PID 1964 wrote to memory of 1368 1964 omsecor.exe 100 PID 1964 wrote to memory of 1368 1964 omsecor.exe 100 PID 1964 wrote to memory of 1368 1964 omsecor.exe 100 PID 1964 wrote to memory of 1368 1964 omsecor.exe 100 PID 1368 wrote to memory of 1072 1368 omsecor.exe 102 PID 1368 wrote to memory of 1072 1368 omsecor.exe 102 PID 1368 wrote to memory of 1072 1368 omsecor.exe 102 PID 1072 wrote to memory of 4828 1072 omsecor.exe 104 PID 1072 wrote to memory of 4828 1072 omsecor.exe 104 PID 1072 wrote to memory of 4828 1072 omsecor.exe 104 PID 1072 wrote to memory of 4828 1072 omsecor.exe 104 PID 1072 wrote to memory of 4828 1072 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe"C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exeC:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 2248⤵
- Program crash
PID:2292
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 2926⤵
- Program crash
PID:1576
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 3004⤵
- Program crash
PID:2584
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 2922⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4588 -ip 45881⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4344 -ip 43441⤵PID:960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1964 -ip 19641⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1072 -ip 10721⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d53e2c9256a4dca9428b5452a7cea9ff
SHA132f85dfde5787dc97968e53a7d0536ef9e318eb8
SHA2569ab461d46036edf8d7bafbbd08545ca5f63d8fe0312081104cbd3b61999faab6
SHA5122d82419342d9e22687518acc80ffe1c7391a7e5bafb07b1a45d8bd559946ec1c8da0fc07edaa66bc488fa5de8ae60d87ccc787149e9010ca7e7b38b7471d9923
-
Filesize
96KB
MD5eec076cdc82f43b08d721f79500c8074
SHA19a6a6d9faef3e11b970f4e14c47f84384c36fafc
SHA2563041bd8a974b30bc48fe113ea23488d0a1fdaadaf2a95bbfd9fb0e4c6c97c7e5
SHA51233f5c6fbeb43e7554c430a539bed59c6c763cd9106bc31e6d80414c11a1404f2b10514828073ad8233f4070b6766c9636b929fbc72dfab6561a2bd975c114a56
-
Filesize
96KB
MD52fa2f344718a8939f23219eefca2e836
SHA1088710292a3f64d3e7d107ab0105563974db8d73
SHA2567ca1477fe536cae6da0a5d60b435cccda85d3f1b086d5b202ebbf170247501e1
SHA512e92ca12e03074dc6e37bda218513d49791270c943b2280f9f494d707b6c5cf570c9b253fab8b77837e06b978672d6d271cd6d1f5861cb49d6756a5279e8eb24c