Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:58
Static task
static1
Behavioral task
behavioral1
Sample
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe
Resource
win7-20240903-en
General
-
Target
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe
-
Size
96KB
-
MD5
78218d41fd66e7e6cadd47af577f71e1
-
SHA1
aa8a7ded8287b189a1a6cf82fbce6f71b6bcd688
-
SHA256
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88
-
SHA512
7ec64b25ef5db3a3070b663c4f46b87daa54a54624ceeda1644e09e8ba6cec2c45c7d7d02920d522ff8c1dadcc11e127f7eb4aecc9c03c1e1e182dd3e02539a3
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:zGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2132 omsecor.exe 1132 omsecor.exe 244 omsecor.exe 724 omsecor.exe 208 omsecor.exe 2440 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3268 set thread context of 2976 3268 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 83 PID 2132 set thread context of 1132 2132 omsecor.exe 88 PID 244 set thread context of 724 244 omsecor.exe 109 PID 208 set thread context of 2440 208 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4784 3268 WerFault.exe 82 1664 2132 WerFault.exe 85 3528 244 WerFault.exe 108 5076 208 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3268 wrote to memory of 2976 3268 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 83 PID 3268 wrote to memory of 2976 3268 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 83 PID 3268 wrote to memory of 2976 3268 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 83 PID 3268 wrote to memory of 2976 3268 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 83 PID 3268 wrote to memory of 2976 3268 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 83 PID 2976 wrote to memory of 2132 2976 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 85 PID 2976 wrote to memory of 2132 2976 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 85 PID 2976 wrote to memory of 2132 2976 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 85 PID 2132 wrote to memory of 1132 2132 omsecor.exe 88 PID 2132 wrote to memory of 1132 2132 omsecor.exe 88 PID 2132 wrote to memory of 1132 2132 omsecor.exe 88 PID 2132 wrote to memory of 1132 2132 omsecor.exe 88 PID 2132 wrote to memory of 1132 2132 omsecor.exe 88 PID 1132 wrote to memory of 244 1132 omsecor.exe 108 PID 1132 wrote to memory of 244 1132 omsecor.exe 108 PID 1132 wrote to memory of 244 1132 omsecor.exe 108 PID 244 wrote to memory of 724 244 omsecor.exe 109 PID 244 wrote to memory of 724 244 omsecor.exe 109 PID 244 wrote to memory of 724 244 omsecor.exe 109 PID 244 wrote to memory of 724 244 omsecor.exe 109 PID 244 wrote to memory of 724 244 omsecor.exe 109 PID 724 wrote to memory of 208 724 omsecor.exe 111 PID 724 wrote to memory of 208 724 omsecor.exe 111 PID 724 wrote to memory of 208 724 omsecor.exe 111 PID 208 wrote to memory of 2440 208 omsecor.exe 113 PID 208 wrote to memory of 2440 208 omsecor.exe 113 PID 208 wrote to memory of 2440 208 omsecor.exe 113 PID 208 wrote to memory of 2440 208 omsecor.exe 113 PID 208 wrote to memory of 2440 208 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe"C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exeC:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 2688⤵
- Program crash
PID:5076
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 244 -s 2926⤵
- Program crash
PID:3528
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 3004⤵
- Program crash
PID:1664
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 2722⤵
- Program crash
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3268 -ip 32681⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2132 -ip 21321⤵PID:3476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 244 -ip 2441⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 208 -ip 2081⤵PID:3544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5eec076cdc82f43b08d721f79500c8074
SHA19a6a6d9faef3e11b970f4e14c47f84384c36fafc
SHA2563041bd8a974b30bc48fe113ea23488d0a1fdaadaf2a95bbfd9fb0e4c6c97c7e5
SHA51233f5c6fbeb43e7554c430a539bed59c6c763cd9106bc31e6d80414c11a1404f2b10514828073ad8233f4070b6766c9636b929fbc72dfab6561a2bd975c114a56
-
Filesize
96KB
MD5d209d9afcc8aa86ecf3771843fd89223
SHA1cec911b5a9bfad45d33580a1ae2677861a674d3c
SHA256efd59776ef409f56dd706f243652eef209e2472d9de0714887af1fdb656f27af
SHA512edf46026c27d24966c8e8597c827cbb463c61a55da7dab291baf5a901abe28a8bf2c9159a0f901d239a5338d66af4e37bb6012217640d202843859b7dbd39c11
-
Filesize
96KB
MD5895fce93636c015292715752340de5aa
SHA1a95565b1bf5f07c1e3737a750fffc54d85aca335
SHA256089d87a8b10b733828689e67d44c6fa8d7196a3656799f7fc972798878931117
SHA51262674f450f0b11b12b6e08a51f2be7fe62b34444a533528981e26cc3821728bdf7254ac255d1bddc99431351ba17e452a941258ca1513f494f3b6c38898c1e6f