Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 20:16
Static task
static1
Behavioral task
behavioral1
Sample
c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe
Resource
win7-20240729-en
General
-
Target
c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe
-
Size
96KB
-
MD5
31259142051fb5b341551ad51cae55c9
-
SHA1
d04b24a96b510995a7d7f6f665bf9eef5a480829
-
SHA256
c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f
-
SHA512
1ebfccf6797b9520bc07b30ea35935cd33770559cd9c9d78da6081988c002fad1e7587f45192f9a6853b9447a0b2e674a33f8ad1f411400efc820ff3415ccfbe
-
SSDEEP
1536:BnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:BGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2336 omsecor.exe 1876 omsecor.exe 2652 omsecor.exe 1648 omsecor.exe 2584 omsecor.exe 3108 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2252 set thread context of 4872 2252 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 82 PID 2336 set thread context of 1876 2336 omsecor.exe 87 PID 2652 set thread context of 1648 2652 omsecor.exe 108 PID 2584 set thread context of 3108 2584 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 2276 2252 WerFault.exe 81 4980 2336 WerFault.exe 85 2912 2652 WerFault.exe 107 4268 2584 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2252 wrote to memory of 4872 2252 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 82 PID 2252 wrote to memory of 4872 2252 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 82 PID 2252 wrote to memory of 4872 2252 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 82 PID 2252 wrote to memory of 4872 2252 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 82 PID 2252 wrote to memory of 4872 2252 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 82 PID 4872 wrote to memory of 2336 4872 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 85 PID 4872 wrote to memory of 2336 4872 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 85 PID 4872 wrote to memory of 2336 4872 c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe 85 PID 2336 wrote to memory of 1876 2336 omsecor.exe 87 PID 2336 wrote to memory of 1876 2336 omsecor.exe 87 PID 2336 wrote to memory of 1876 2336 omsecor.exe 87 PID 2336 wrote to memory of 1876 2336 omsecor.exe 87 PID 2336 wrote to memory of 1876 2336 omsecor.exe 87 PID 1876 wrote to memory of 2652 1876 omsecor.exe 107 PID 1876 wrote to memory of 2652 1876 omsecor.exe 107 PID 1876 wrote to memory of 2652 1876 omsecor.exe 107 PID 2652 wrote to memory of 1648 2652 omsecor.exe 108 PID 2652 wrote to memory of 1648 2652 omsecor.exe 108 PID 2652 wrote to memory of 1648 2652 omsecor.exe 108 PID 2652 wrote to memory of 1648 2652 omsecor.exe 108 PID 2652 wrote to memory of 1648 2652 omsecor.exe 108 PID 1648 wrote to memory of 2584 1648 omsecor.exe 110 PID 1648 wrote to memory of 2584 1648 omsecor.exe 110 PID 1648 wrote to memory of 2584 1648 omsecor.exe 110 PID 2584 wrote to memory of 3108 2584 omsecor.exe 112 PID 2584 wrote to memory of 3108 2584 omsecor.exe 112 PID 2584 wrote to memory of 3108 2584 omsecor.exe 112 PID 2584 wrote to memory of 3108 2584 omsecor.exe 112 PID 2584 wrote to memory of 3108 2584 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe"C:\Users\Admin\AppData\Local\Temp\c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exeC:\Users\Admin\AppData\Local\Temp\c2bb4cd1253f1c220eddd298ddf39c376c6902401643b0f42eb09b5432fc134f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2568⤵
- Program crash
PID:4268
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 2926⤵
- Program crash
PID:2912
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 2884⤵
- Program crash
PID:4980
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 3002⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2252 -ip 22521⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2336 -ip 23361⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2652 -ip 26521⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2584 -ip 25841⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD580e4763f4d972cb87d834c87b9e4c0d5
SHA19716529b023699fc743294f4a7a4b0a7dd6d48c7
SHA256f8a42ce7d46826dd3a471efc9a96518f824c463d0e9c19206dc66eebf16b971c
SHA512285f6deeca754a254133cae320f1a66d7cf4f5d1a60bdb808bd7b73ddf6d823c0d791507abd5c22964518180ea25c1be6822bdf0e6fbaf4570ca328ede510e2d
-
Filesize
96KB
MD51394437ad8788e301cf61e016eb630ca
SHA16fb4d8f881095f187d85fcebeb9adc44f465cf43
SHA256f103bf3214dc49e03a62c5f5505e434a24589e506c6a67662cee51755c771842
SHA51205355783c0c3c113871df10741c420d890d857bd691634666cdc2e2a95e2bd2cc35ef94a50489a8c66e667b434006fa4086c0d540bd8a978c07ec692dfc72612
-
Filesize
96KB
MD5645f9c921f16d805029cc18db0cc1e4a
SHA131089a18fdca10dd1de5f9afb11450e82c9522e0
SHA256fdd852e34e08424d9a64a377a01a8f51c29c613dc33df7a5863b3495375e973b
SHA5125305fb5fe42b785154e7e01dec46e07d49b79224d94f885f2cd66a10b620514d0ecd9d11762c3f516b5ac20100813aeed4e3d305c5464246ca5140a9aa26f6f4