Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 08:51
Static task
static1
Behavioral task
behavioral1
Sample
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe
Resource
win7-20241023-en
General
-
Target
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe
-
Size
134KB
-
MD5
931ecac4934cf5a1df86431eb9d2fa52
-
SHA1
8aae04793f6d310e3f7187fc82428953767a19b1
-
SHA256
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748
-
SHA512
ee02a0015b832b1de9e073122a240c36be2ea3c5ca18815a317e804d26c0eea25a60ec6599434a95614ccb9f913f772ff44932d251f471e3dcb87c154a37bd66
-
SSDEEP
1536:CDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:0iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3488 omsecor.exe 1020 omsecor.exe 3988 omsecor.exe 1616 omsecor.exe 3200 omsecor.exe 5048 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4544 set thread context of 1456 4544 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 82 PID 3488 set thread context of 1020 3488 omsecor.exe 86 PID 3988 set thread context of 1616 3988 omsecor.exe 100 PID 3200 set thread context of 5048 3200 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3604 4544 WerFault.exe 81 2240 3488 WerFault.exe 85 5008 3988 WerFault.exe 99 4364 3200 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1456 4544 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 82 PID 4544 wrote to memory of 1456 4544 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 82 PID 4544 wrote to memory of 1456 4544 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 82 PID 4544 wrote to memory of 1456 4544 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 82 PID 4544 wrote to memory of 1456 4544 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 82 PID 1456 wrote to memory of 3488 1456 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 1456 wrote to memory of 3488 1456 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 1456 wrote to memory of 3488 1456 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 3488 wrote to memory of 1020 3488 omsecor.exe 86 PID 3488 wrote to memory of 1020 3488 omsecor.exe 86 PID 3488 wrote to memory of 1020 3488 omsecor.exe 86 PID 3488 wrote to memory of 1020 3488 omsecor.exe 86 PID 3488 wrote to memory of 1020 3488 omsecor.exe 86 PID 1020 wrote to memory of 3988 1020 omsecor.exe 99 PID 1020 wrote to memory of 3988 1020 omsecor.exe 99 PID 1020 wrote to memory of 3988 1020 omsecor.exe 99 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 1616 wrote to memory of 3200 1616 omsecor.exe 102 PID 1616 wrote to memory of 3200 1616 omsecor.exe 102 PID 1616 wrote to memory of 3200 1616 omsecor.exe 102 PID 3200 wrote to memory of 5048 3200 omsecor.exe 104 PID 3200 wrote to memory of 5048 3200 omsecor.exe 104 PID 3200 wrote to memory of 5048 3200 omsecor.exe 104 PID 3200 wrote to memory of 5048 3200 omsecor.exe 104 PID 3200 wrote to memory of 5048 3200 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe"C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exeC:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 2568⤵
- Program crash
PID:4364
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 2926⤵
- Program crash
PID:5008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 2884⤵
- Program crash
PID:2240
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 3002⤵
- Program crash
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4544 -ip 45441⤵PID:3672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3488 -ip 34881⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3988 -ip 39881⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3200 -ip 32001⤵PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5ab036faa8225b9316115184b7b4475e2
SHA12ce83af1b9d024f15cd8aefff21963a9a74e1ab2
SHA256a3bb3c765509970621a7500aac209b824965411244aae16a4a39fd49219f7c3c
SHA5126a8c84f72fac82ec2ff98799a580b820f8bdbfa2c68592878d7833475be903011acc1732438227b843a8923f100e084dd1ab484cd1ce7259973db186decfea0d
-
Filesize
134KB
MD50e78991117c80a9106ee4b10cf591eef
SHA139990c161fc2c74a341e1138cb403689a010050f
SHA256e8c4ff54bd1b5c1a22e4207bd5d8616ae687867e196df2b94c78a72f43b955e1
SHA5126b1bb17502df791800fb8fca32c1b866fb74c4859c0b290da07f462e63c5a0ae8b648b4e439d49a584e18f561f15d3ca80d53532c4299bae43dc817c94766b29
-
Filesize
134KB
MD52213fa6a99be1580044d885317603f51
SHA19434b66aa40d46d699decd8a8e09da69ff810e12
SHA256e104401b06b48ef1024c1bd758a2c387e40df03fe4e145ba7c0b6a488d15cc3f
SHA5124136b230d9f759ecf83959d160e18712d238bdcc0ce57773f59c193b67bce7d704982ee6c5a9e30d5096371aca6d70040ed381780eb0172216bb3a3da5f7de4a