Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 08:02
Static task
static1
Behavioral task
behavioral1
Sample
bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe
Resource
win7-20240903-en
General
-
Target
bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe
-
Size
96KB
-
MD5
baef7c20c5e18a5657edb38c27e150d0
-
SHA1
7128a13c102608f7521d8749eb55f39190c87262
-
SHA256
bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832
-
SHA512
62680aaf8affee978b55cdb6e3bce1081032666fd226db1b5178521681aedbb1139202a4010ff6602ca71f057a17baf133ced83491431bd6a127cd717db69f41
-
SSDEEP
1536:mnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:mGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2188 omsecor.exe 3960 omsecor.exe 3304 omsecor.exe 940 omsecor.exe 5036 omsecor.exe 1212 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1516 set thread context of 1144 1516 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 84 PID 2188 set thread context of 3960 2188 omsecor.exe 88 PID 3304 set thread context of 940 3304 omsecor.exe 102 PID 5036 set thread context of 1212 5036 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 4024 1516 WerFault.exe 83 3816 2188 WerFault.exe 87 4312 3304 WerFault.exe 101 1248 5036 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1144 1516 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 84 PID 1516 wrote to memory of 1144 1516 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 84 PID 1516 wrote to memory of 1144 1516 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 84 PID 1516 wrote to memory of 1144 1516 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 84 PID 1516 wrote to memory of 1144 1516 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 84 PID 1144 wrote to memory of 2188 1144 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 87 PID 1144 wrote to memory of 2188 1144 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 87 PID 1144 wrote to memory of 2188 1144 bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe 87 PID 2188 wrote to memory of 3960 2188 omsecor.exe 88 PID 2188 wrote to memory of 3960 2188 omsecor.exe 88 PID 2188 wrote to memory of 3960 2188 omsecor.exe 88 PID 2188 wrote to memory of 3960 2188 omsecor.exe 88 PID 2188 wrote to memory of 3960 2188 omsecor.exe 88 PID 3960 wrote to memory of 3304 3960 omsecor.exe 101 PID 3960 wrote to memory of 3304 3960 omsecor.exe 101 PID 3960 wrote to memory of 3304 3960 omsecor.exe 101 PID 3304 wrote to memory of 940 3304 omsecor.exe 102 PID 3304 wrote to memory of 940 3304 omsecor.exe 102 PID 3304 wrote to memory of 940 3304 omsecor.exe 102 PID 3304 wrote to memory of 940 3304 omsecor.exe 102 PID 3304 wrote to memory of 940 3304 omsecor.exe 102 PID 940 wrote to memory of 5036 940 omsecor.exe 104 PID 940 wrote to memory of 5036 940 omsecor.exe 104 PID 940 wrote to memory of 5036 940 omsecor.exe 104 PID 5036 wrote to memory of 1212 5036 omsecor.exe 106 PID 5036 wrote to memory of 1212 5036 omsecor.exe 106 PID 5036 wrote to memory of 1212 5036 omsecor.exe 106 PID 5036 wrote to memory of 1212 5036 omsecor.exe 106 PID 5036 wrote to memory of 1212 5036 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe"C:\Users\Admin\AppData\Local\Temp\bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exeC:\Users\Admin\AppData\Local\Temp\bbabd4ebfd6c8f5f61a32fbd69096592a74d8599583007748a2ffe9604c94832N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 2688⤵
- Program crash
PID:1248
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 2926⤵
- Program crash
PID:4312
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 2884⤵
- Program crash
PID:3816
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 2722⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1516 -ip 15161⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2188 -ip 21881⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3304 -ip 33041⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5036 -ip 50361⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a4108109b352d0eba7f154bf8232a8b8
SHA127de92cf00057c7240584499935b9d08cc66621c
SHA25601911c7e7a2af975feb1538dbc7ecb98192bd3d69929577c1584fc940c4c3e9a
SHA5120c2180f2516cd4e49c6b4f005c255f3b1944c9e9d128613742df2292e5d1b372bded9971a61bf7ddb9ff07f2e81c0b27633e49d218cdd63b85a28e5a9350a637
-
Filesize
96KB
MD515ca7cfa8985f704fc6c289fb24abfc4
SHA110f811be18b66daa1af1fe162063b26ae41b78bb
SHA256f3ab3663e782611498f1d48f6a126462b530a0d648a6d47b6ae7b77910ee6dd4
SHA5122459fedaab0555dbb65b2bcb048e7332cb837a3c633301a37ec9e39cad0c4011d3a045f15bc0deb6a1d759c69d612799b68322e8a7e84961d83be65f4cb00368
-
Filesize
96KB
MD564c382c47e7b57d9fcf7cea2f6557b7b
SHA10e1bc9f10b06f3a23ee1d26c9c37a9c9bdb1679a
SHA256f5b0c7dbd5b17576d84a6baeafe4122075bf1b2665aca1d3723b707717d76353
SHA512e359ceb8fc8c776bbc2823c2888dcb3983ec3f45ff1b3ff68c94801ea6e35372b9b45f5a3b37b1844a1f0e100c69c71b31d1cc8881d331cfd4471c32f8daec31