Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 14:40
Static task
static1
Behavioral task
behavioral1
Sample
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe
Resource
win7-20240903-en
General
-
Target
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe
-
Size
134KB
-
MD5
f4b1adc0184021c94cf8384a1d29ac30
-
SHA1
092c451b993486aff776c87a6bfaea0249c1f29f
-
SHA256
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3
-
SHA512
5dd1bd77fd58fdaf641f52d0cb9947fccf07a512870381eda0a2a9d96b5951a931ee4e81300e2e3628e24662ca55298b4d71de7f1cc5353fe8f0fd0659d5180d
-
SSDEEP
1536:8DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCif:iiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 5024 omsecor.exe 3620 omsecor.exe 636 omsecor.exe 1664 omsecor.exe 2012 omsecor.exe 2320 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4720 set thread context of 3664 4720 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 82 PID 5024 set thread context of 3620 5024 omsecor.exe 86 PID 636 set thread context of 1664 636 omsecor.exe 100 PID 2012 set thread context of 2320 2012 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 3704 4720 WerFault.exe 81 1748 5024 WerFault.exe 85 4680 636 WerFault.exe 99 3888 2012 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3664 4720 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 82 PID 4720 wrote to memory of 3664 4720 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 82 PID 4720 wrote to memory of 3664 4720 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 82 PID 4720 wrote to memory of 3664 4720 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 82 PID 4720 wrote to memory of 3664 4720 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 82 PID 3664 wrote to memory of 5024 3664 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 85 PID 3664 wrote to memory of 5024 3664 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 85 PID 3664 wrote to memory of 5024 3664 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 85 PID 5024 wrote to memory of 3620 5024 omsecor.exe 86 PID 5024 wrote to memory of 3620 5024 omsecor.exe 86 PID 5024 wrote to memory of 3620 5024 omsecor.exe 86 PID 5024 wrote to memory of 3620 5024 omsecor.exe 86 PID 5024 wrote to memory of 3620 5024 omsecor.exe 86 PID 3620 wrote to memory of 636 3620 omsecor.exe 99 PID 3620 wrote to memory of 636 3620 omsecor.exe 99 PID 3620 wrote to memory of 636 3620 omsecor.exe 99 PID 636 wrote to memory of 1664 636 omsecor.exe 100 PID 636 wrote to memory of 1664 636 omsecor.exe 100 PID 636 wrote to memory of 1664 636 omsecor.exe 100 PID 636 wrote to memory of 1664 636 omsecor.exe 100 PID 636 wrote to memory of 1664 636 omsecor.exe 100 PID 1664 wrote to memory of 2012 1664 omsecor.exe 102 PID 1664 wrote to memory of 2012 1664 omsecor.exe 102 PID 1664 wrote to memory of 2012 1664 omsecor.exe 102 PID 2012 wrote to memory of 2320 2012 omsecor.exe 103 PID 2012 wrote to memory of 2320 2012 omsecor.exe 103 PID 2012 wrote to memory of 2320 2012 omsecor.exe 103 PID 2012 wrote to memory of 2320 2012 omsecor.exe 103 PID 2012 wrote to memory of 2320 2012 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe"C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exeC:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 2568⤵
- Program crash
PID:3888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 2926⤵
- Program crash
PID:4680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 2884⤵
- Program crash
PID:1748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 3002⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4720 -ip 47201⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5024 -ip 50241⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 636 -ip 6361⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2012 -ip 20121⤵PID:2980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD55510a9fc357a4f186c95a0217031033a
SHA1b330700a0e8fd7b9aba6e0b596691065f212d8d9
SHA25649e1a63b71067cdc7d7480da1bad00f43ce98775cf3212fbf021003ca8c3f3e7
SHA5120c94bebc7bdcc3e6d9da994c81469adf26e34075fdc047a4872e49947a8a72bd80d5e887b2337d10af58e51935d435752cdfac62931069fa93711b1a044c8ac6
-
Filesize
134KB
MD54d23bb21c3e235a254f682b7eec0504a
SHA1bac0be8afaa16d7c4c716310d745424e9b322aac
SHA256b30ff66298e0363b37a2f53cc0e24e7399ff62d387398cf0a703f859566f3f12
SHA512a00330dce8069c8d23813a2dade77a0cca2ca5eaf9cbfb2651708b5312f5173e275fca26cbc51db3c7fe08cf32e1063f49d2fa16e4ba811ecc4ca930e014382d
-
Filesize
134KB
MD53059c4f5f73cd2478556f77b590f5bf3
SHA140858b40c266d67a251ac0a7960b1c698def6929
SHA256a3dcd7d6a5f6e9facb47e283bcc013c6caca705afe89a932d7ecc233747c474f
SHA512d1e46a0da00d7d9a1e463d317a62cae0fbe3da02954acf9e862b5fde1298d20bcea3075b86c4d37e1a12920affc9e06def51daeaffd354f164d02b9dba79df6c