Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 14:29
Static task
static1
Behavioral task
behavioral1
Sample
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe
Resource
win7-20240903-en
General
-
Target
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe
-
Size
134KB
-
MD5
f4b1adc0184021c94cf8384a1d29ac30
-
SHA1
092c451b993486aff776c87a6bfaea0249c1f29f
-
SHA256
28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3
-
SHA512
5dd1bd77fd58fdaf641f52d0cb9947fccf07a512870381eda0a2a9d96b5951a931ee4e81300e2e3628e24662ca55298b4d71de7f1cc5353fe8f0fd0659d5180d
-
SSDEEP
1536:8DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCif:iiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2356 omsecor.exe 2640 omsecor.exe 4408 omsecor.exe 3676 omsecor.exe 4856 omsecor.exe 4564 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3788 set thread context of 3944 3788 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 83 PID 2356 set thread context of 2640 2356 omsecor.exe 87 PID 4408 set thread context of 3676 4408 omsecor.exe 109 PID 4856 set thread context of 4564 4856 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 552 3788 WerFault.exe 82 3016 2356 WerFault.exe 85 4324 4408 WerFault.exe 108 3988 4856 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3788 wrote to memory of 3944 3788 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 83 PID 3788 wrote to memory of 3944 3788 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 83 PID 3788 wrote to memory of 3944 3788 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 83 PID 3788 wrote to memory of 3944 3788 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 83 PID 3788 wrote to memory of 3944 3788 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 83 PID 3944 wrote to memory of 2356 3944 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 85 PID 3944 wrote to memory of 2356 3944 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 85 PID 3944 wrote to memory of 2356 3944 28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe 85 PID 2356 wrote to memory of 2640 2356 omsecor.exe 87 PID 2356 wrote to memory of 2640 2356 omsecor.exe 87 PID 2356 wrote to memory of 2640 2356 omsecor.exe 87 PID 2356 wrote to memory of 2640 2356 omsecor.exe 87 PID 2356 wrote to memory of 2640 2356 omsecor.exe 87 PID 2640 wrote to memory of 4408 2640 omsecor.exe 108 PID 2640 wrote to memory of 4408 2640 omsecor.exe 108 PID 2640 wrote to memory of 4408 2640 omsecor.exe 108 PID 4408 wrote to memory of 3676 4408 omsecor.exe 109 PID 4408 wrote to memory of 3676 4408 omsecor.exe 109 PID 4408 wrote to memory of 3676 4408 omsecor.exe 109 PID 4408 wrote to memory of 3676 4408 omsecor.exe 109 PID 4408 wrote to memory of 3676 4408 omsecor.exe 109 PID 3676 wrote to memory of 4856 3676 omsecor.exe 111 PID 3676 wrote to memory of 4856 3676 omsecor.exe 111 PID 3676 wrote to memory of 4856 3676 omsecor.exe 111 PID 4856 wrote to memory of 4564 4856 omsecor.exe 113 PID 4856 wrote to memory of 4564 4856 omsecor.exe 113 PID 4856 wrote to memory of 4564 4856 omsecor.exe 113 PID 4856 wrote to memory of 4564 4856 omsecor.exe 113 PID 4856 wrote to memory of 4564 4856 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe"C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exeC:\Users\Admin\AppData\Local\Temp\28f731600eedc07ebf8d60faa7d4322d4a5f2bde6d8f3394616f0f6d74de4ad3.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 2568⤵
- Program crash
PID:3988
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 2926⤵
- Program crash
PID:4324
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2356 -s 2884⤵
- Program crash
PID:3016
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 2882⤵
- Program crash
PID:552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3788 -ip 37881⤵PID:4492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2356 -ip 23561⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4408 -ip 44081⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4856 -ip 48561⤵PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD57043f5424fdb932875460c58698081f0
SHA124d7a4d92fd3f91151dc646f55e5f85316512284
SHA256116c1ab7f62459f15d257c79ec85674843ae63b6fd8f4dc19e0dd572578ea5d4
SHA512cdfd5c14f4bab10e983029268b9835308b33eda764dfbcbb522a831d36916202f0c273025b3e304eeed2874685aa7c28af4e82e2bc6e4667f9c7526bb1ae4973
-
Filesize
134KB
MD54d23bb21c3e235a254f682b7eec0504a
SHA1bac0be8afaa16d7c4c716310d745424e9b322aac
SHA256b30ff66298e0363b37a2f53cc0e24e7399ff62d387398cf0a703f859566f3f12
SHA512a00330dce8069c8d23813a2dade77a0cca2ca5eaf9cbfb2651708b5312f5173e275fca26cbc51db3c7fe08cf32e1063f49d2fa16e4ba811ecc4ca930e014382d
-
Filesize
134KB
MD5e88140fb398b73a29ee8e75c47750b5c
SHA1b0619fca520658a6fcaeb8a4f13cfc20e42eef04
SHA256c6d0d52888f12d87d13ee0ba0508ba8ba65a14969d9ec348ef870b62eefe2dd1
SHA5124f08393f08a88beb3a9a260cdfb1c70857ef9258ecad725ae455f12d6a019462cfadda3358a3e00a735f311a04d5765a5a833a36697d4d5343e55367a78bc97e