Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 22:24
Static task
static1
Behavioral task
behavioral1
Sample
ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe
Resource
win7-20240903-en
General
-
Target
ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe
-
Size
96KB
-
MD5
4bd59731fc24d9c116fcda0149fb02ff
-
SHA1
f6acf67de9b320a883cbe2412a1cd6e80ab79359
-
SHA256
ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da
-
SHA512
bfc0e28509c9a3affeb865674bee67f7c775a1624b8905dae0486b72e2b379922edbfbce43e681ffe1e68c50eee03d9b3319eb27dc559a8bc5e002c96db4db9f
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:EGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3472 omsecor.exe 3308 omsecor.exe 4444 omsecor.exe 2988 omsecor.exe 2836 omsecor.exe 2364 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4868 set thread context of 4880 4868 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 83 PID 3472 set thread context of 3308 3472 omsecor.exe 88 PID 4444 set thread context of 2988 4444 omsecor.exe 108 PID 2836 set thread context of 2364 2836 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4488 4868 WerFault.exe 82 5044 3472 WerFault.exe 85 892 4444 WerFault.exe 107 1344 2836 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4868 wrote to memory of 4880 4868 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 83 PID 4868 wrote to memory of 4880 4868 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 83 PID 4868 wrote to memory of 4880 4868 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 83 PID 4868 wrote to memory of 4880 4868 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 83 PID 4868 wrote to memory of 4880 4868 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 83 PID 4880 wrote to memory of 3472 4880 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 85 PID 4880 wrote to memory of 3472 4880 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 85 PID 4880 wrote to memory of 3472 4880 ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe 85 PID 3472 wrote to memory of 3308 3472 omsecor.exe 88 PID 3472 wrote to memory of 3308 3472 omsecor.exe 88 PID 3472 wrote to memory of 3308 3472 omsecor.exe 88 PID 3472 wrote to memory of 3308 3472 omsecor.exe 88 PID 3472 wrote to memory of 3308 3472 omsecor.exe 88 PID 3308 wrote to memory of 4444 3308 omsecor.exe 107 PID 3308 wrote to memory of 4444 3308 omsecor.exe 107 PID 3308 wrote to memory of 4444 3308 omsecor.exe 107 PID 4444 wrote to memory of 2988 4444 omsecor.exe 108 PID 4444 wrote to memory of 2988 4444 omsecor.exe 108 PID 4444 wrote to memory of 2988 4444 omsecor.exe 108 PID 4444 wrote to memory of 2988 4444 omsecor.exe 108 PID 4444 wrote to memory of 2988 4444 omsecor.exe 108 PID 2988 wrote to memory of 2836 2988 omsecor.exe 110 PID 2988 wrote to memory of 2836 2988 omsecor.exe 110 PID 2988 wrote to memory of 2836 2988 omsecor.exe 110 PID 2836 wrote to memory of 2364 2836 omsecor.exe 112 PID 2836 wrote to memory of 2364 2836 omsecor.exe 112 PID 2836 wrote to memory of 2364 2836 omsecor.exe 112 PID 2836 wrote to memory of 2364 2836 omsecor.exe 112 PID 2836 wrote to memory of 2364 2836 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe"C:\Users\Admin\AppData\Local\Temp\ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exeC:\Users\Admin\AppData\Local\Temp\ab668982bfab822a30cfc77c78ec0b77069f89278e2c89cafc2a8ba1657165da.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 2688⤵
- Program crash
PID:1344
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 3046⤵
- Program crash
PID:892
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 2604⤵
- Program crash
PID:5044
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 2882⤵
- Program crash
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4868 -ip 48681⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3472 -ip 34721⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4444 -ip 44441⤵PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2836 -ip 28361⤵PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54d86d58e541f04c51e27b9033b9c48c4
SHA101100b9435dcc4004c671b3c99910d5bf5c28e08
SHA256376bf70c608c4ca206030699cb719722ade0e9d32891adc20ac8b895683d5de1
SHA5127e703910aae15e58bdf9a6626f1540b79bdae969d2e12f706f69ccf7996c3f3151b438b57bad8b17f75aedbff7fea69ff35b5c9b4413a7daaa60fc1cffac6870
-
Filesize
96KB
MD58f764a08255e4f2c37fc23c1a8512ea0
SHA16eb198f9fdd0c70bacb3e2a69514446fa9dd87fc
SHA2563b8fb1279c02aaae3f193897064b193a77413796c7b1e53abf38298ae7afc398
SHA512030bf9d58974693cb35d3484cba0060afe9dcb5aa16e3ffafd2f39761293d1ca8964d6dd9062a8a663041757de06cd878d9a935b3ed582f10088f4284d5ee8e2
-
Filesize
96KB
MD5c61b68fce4a75a17bc1c548daaa55b34
SHA1d335afd717da21918e320a9dd1bbb55afd5c68f8
SHA2564b85304bf175a892f31c19cdfe399d85bd6f6d0fcdb383e39a5d8e9780e69876
SHA512322b86d188fbf17c51c412feb01fee694704fa1a7d1c8f060cabf9b3d8981cf82c1834f335f1451dad4de6c2fbaef172a7a57728f58fc264ac9ac01547577dab