Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 08:56
Static task
static1
Behavioral task
behavioral1
Sample
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe
Resource
win7-20240903-en
General
-
Target
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe
-
Size
134KB
-
MD5
931ecac4934cf5a1df86431eb9d2fa52
-
SHA1
8aae04793f6d310e3f7187fc82428953767a19b1
-
SHA256
b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748
-
SHA512
ee02a0015b832b1de9e073122a240c36be2ea3c5ca18815a317e804d26c0eea25a60ec6599434a95614ccb9f913f772ff44932d251f471e3dcb87c154a37bd66
-
SSDEEP
1536:CDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:0iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3004 omsecor.exe 2696 omsecor.exe 2200 omsecor.exe 4080 omsecor.exe 3556 omsecor.exe 3332 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 396 set thread context of 2024 396 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 3004 set thread context of 2696 3004 omsecor.exe 89 PID 2200 set thread context of 4080 2200 omsecor.exe 110 PID 3556 set thread context of 3332 3556 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3376 396 WerFault.exe 84 2420 3004 WerFault.exe 88 4600 2200 WerFault.exe 109 2452 3556 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 396 wrote to memory of 2024 396 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 396 wrote to memory of 2024 396 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 396 wrote to memory of 2024 396 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 396 wrote to memory of 2024 396 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 396 wrote to memory of 2024 396 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 85 PID 2024 wrote to memory of 3004 2024 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 88 PID 2024 wrote to memory of 3004 2024 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 88 PID 2024 wrote to memory of 3004 2024 b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe 88 PID 3004 wrote to memory of 2696 3004 omsecor.exe 89 PID 3004 wrote to memory of 2696 3004 omsecor.exe 89 PID 3004 wrote to memory of 2696 3004 omsecor.exe 89 PID 3004 wrote to memory of 2696 3004 omsecor.exe 89 PID 3004 wrote to memory of 2696 3004 omsecor.exe 89 PID 2696 wrote to memory of 2200 2696 omsecor.exe 109 PID 2696 wrote to memory of 2200 2696 omsecor.exe 109 PID 2696 wrote to memory of 2200 2696 omsecor.exe 109 PID 2200 wrote to memory of 4080 2200 omsecor.exe 110 PID 2200 wrote to memory of 4080 2200 omsecor.exe 110 PID 2200 wrote to memory of 4080 2200 omsecor.exe 110 PID 2200 wrote to memory of 4080 2200 omsecor.exe 110 PID 2200 wrote to memory of 4080 2200 omsecor.exe 110 PID 4080 wrote to memory of 3556 4080 omsecor.exe 112 PID 4080 wrote to memory of 3556 4080 omsecor.exe 112 PID 4080 wrote to memory of 3556 4080 omsecor.exe 112 PID 3556 wrote to memory of 3332 3556 omsecor.exe 113 PID 3556 wrote to memory of 3332 3556 omsecor.exe 113 PID 3556 wrote to memory of 3332 3556 omsecor.exe 113 PID 3556 wrote to memory of 3332 3556 omsecor.exe 113 PID 3556 wrote to memory of 3332 3556 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe"C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exeC:\Users\Admin\AppData\Local\Temp\b69e0728656cd595854cabed4cb4298356423c2d4f61788da7e0d62aa7176748.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 2568⤵
- Program crash
PID:2452
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 2926⤵
- Program crash
PID:4600
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 3004⤵
- Program crash
PID:2420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 2882⤵
- Program crash
PID:3376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 396 -ip 3961⤵PID:560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3004 -ip 30041⤵PID:1684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2200 -ip 22001⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3556 -ip 35561⤵PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5043f82d3884c7eca3782e519b118ea98
SHA1fc55190feb60037a8fabeac2c2597e6c1ba35bcc
SHA25639cb8c58e49d2f589138fddc2e9a7349d44163bd652e0ff7363299a1b7eb481e
SHA512dc8aacc71ff25a9c589f262c6e1199b942aaa43a179566c52f331f308aefa26a657d32461892fc258a59a0bc07a85ce91e91148bb4eaa8b7126a7a73794b3284
-
Filesize
134KB
MD50e78991117c80a9106ee4b10cf591eef
SHA139990c161fc2c74a341e1138cb403689a010050f
SHA256e8c4ff54bd1b5c1a22e4207bd5d8616ae687867e196df2b94c78a72f43b955e1
SHA5126b1bb17502df791800fb8fca32c1b866fb74c4859c0b290da07f462e63c5a0ae8b648b4e439d49a584e18f561f15d3ca80d53532c4299bae43dc817c94766b29
-
Filesize
134KB
MD5f337d1d7dc9f214660fdb3fc92f65537
SHA1925a4e5e4f2e5ed205e623035d70cc06ff07eeb0
SHA25638059d50999e9017ad835f4c531479b9547e91fb2055f92c13392ae53d7ffd15
SHA5129440cdb7b5521b57fe54a06b3d5695fd59eda4de37f23152eb2061c5956f1037f33ae40caf3cae463d92da24fe6e619d608c9312e82c4e632f40f906723b4e5b