Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 22:55
Static task
static1
Behavioral task
behavioral1
Sample
b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe
Resource
win7-20240903-en
General
-
Target
b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe
-
Size
96KB
-
MD5
bb3015f0deec5703b41f72f1801b7cb3
-
SHA1
2ae404f298b282bd26d6a6529cc18539f87c690a
-
SHA256
b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08
-
SHA512
05dee2ec3e405164b94d99d3a04db084bab07661b1c9266f6d788ea80995510998f4ea9752db52389f019f3ccfd14686f4ecbb8b361a8fe979b20203be93d8aa
-
SSDEEP
1536:onAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:oGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2388 omsecor.exe 1896 omsecor.exe 1420 omsecor.exe 4672 omsecor.exe 704 omsecor.exe 3228 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 988 set thread context of 3668 988 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 83 PID 2388 set thread context of 1896 2388 omsecor.exe 88 PID 1420 set thread context of 4672 1420 omsecor.exe 109 PID 704 set thread context of 3228 704 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4732 988 WerFault.exe 82 1168 2388 WerFault.exe 85 2512 1420 WerFault.exe 108 1824 704 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 988 wrote to memory of 3668 988 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 83 PID 988 wrote to memory of 3668 988 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 83 PID 988 wrote to memory of 3668 988 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 83 PID 988 wrote to memory of 3668 988 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 83 PID 988 wrote to memory of 3668 988 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 83 PID 3668 wrote to memory of 2388 3668 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 85 PID 3668 wrote to memory of 2388 3668 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 85 PID 3668 wrote to memory of 2388 3668 b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe 85 PID 2388 wrote to memory of 1896 2388 omsecor.exe 88 PID 2388 wrote to memory of 1896 2388 omsecor.exe 88 PID 2388 wrote to memory of 1896 2388 omsecor.exe 88 PID 2388 wrote to memory of 1896 2388 omsecor.exe 88 PID 2388 wrote to memory of 1896 2388 omsecor.exe 88 PID 1896 wrote to memory of 1420 1896 omsecor.exe 108 PID 1896 wrote to memory of 1420 1896 omsecor.exe 108 PID 1896 wrote to memory of 1420 1896 omsecor.exe 108 PID 1420 wrote to memory of 4672 1420 omsecor.exe 109 PID 1420 wrote to memory of 4672 1420 omsecor.exe 109 PID 1420 wrote to memory of 4672 1420 omsecor.exe 109 PID 1420 wrote to memory of 4672 1420 omsecor.exe 109 PID 1420 wrote to memory of 4672 1420 omsecor.exe 109 PID 4672 wrote to memory of 704 4672 omsecor.exe 111 PID 4672 wrote to memory of 704 4672 omsecor.exe 111 PID 4672 wrote to memory of 704 4672 omsecor.exe 111 PID 704 wrote to memory of 3228 704 omsecor.exe 113 PID 704 wrote to memory of 3228 704 omsecor.exe 113 PID 704 wrote to memory of 3228 704 omsecor.exe 113 PID 704 wrote to memory of 3228 704 omsecor.exe 113 PID 704 wrote to memory of 3228 704 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe"C:\Users\Admin\AppData\Local\Temp\b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exeC:\Users\Admin\AppData\Local\Temp\b93402cbc7cb95517482acf086b8aa8fc06edd8f10e199f86d500ee62e3bee08.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 704 -s 2688⤵
- Program crash
PID:1824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 2926⤵
- Program crash
PID:2512
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 2884⤵
- Program crash
PID:1168
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 3002⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 988 -ip 9881⤵PID:724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2388 -ip 23881⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1420 -ip 14201⤵PID:2784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 704 -ip 7041⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c22960cc88d4b99c65f2688172cfe261
SHA195502e212f71bbb781c235c4a3ca59673364fc4e
SHA2560513aa08bb05c482973113d94283defe6ccb3374d7f662048b8f7779d3302166
SHA5121080edc4163eb04b0c59c2980f8e809a8d3c89a9a1c3521acd4e3cceb6e23b68c7abe799048349c00c768202c99a84034fee5d6661a6b3108b60357502ab2fce
-
Filesize
96KB
MD5dc835ad6065b8484aa9f94a6d6535a54
SHA126ae266988c2bf266a1a097d9ca045fa9e4ff501
SHA2563c7c89d6d363dbc7a9ab86fa085e3f019ecfdb0922fe9ef233671e2b4531e422
SHA512db1067b50b02bd1f5ca00e9412ccd4966062c4eef00a0f94f3205dc29a34fff885d7e709ccb7062797c6afc2042de61eea3824ffa83292c14bc930214dbb8fa3
-
Filesize
96KB
MD5260d923f468529e14a6934778bd487f2
SHA189dc9a770f2702e4ce0a9c0cc45a055fbdcec47b
SHA2562fb90d83be145999a031e00158a49933718362028a2442890fd6c5d22d87d477
SHA5123f00c58718d01e0c87c8b676578c9b2c49d32ae7a26e489dc24f64da7d31a6e0466f3627704581ef044207b1e7aca2e91332b35e387e669f9ecae3ad4fc72db9