Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 20:42
Static task
static1
Behavioral task
behavioral1
Sample
21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe
Resource
win7-20241010-en
General
-
Target
21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe
-
Size
96KB
-
MD5
e07d0b15d4e7503500807aa373df6a6a
-
SHA1
18e97aed437d6caaf333cd4667a10ed235d30ca7
-
SHA256
21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164
-
SHA512
a0786f76b4076de6de00be786f57ff949161189a8b69275813e5b0a68b146c98164c5b785e1f824b701d657d3fbb5e25377805376306cfccbbb4ad3386c150d1
-
SSDEEP
1536:1nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:1Gs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3436 omsecor.exe 2152 omsecor.exe 1520 omsecor.exe 5096 omsecor.exe 1944 omsecor.exe 4568 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3004 set thread context of 3504 3004 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 83 PID 3436 set thread context of 2152 3436 omsecor.exe 88 PID 1520 set thread context of 5096 1520 omsecor.exe 109 PID 1944 set thread context of 4568 1944 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4996 3004 WerFault.exe 82 1464 3436 WerFault.exe 86 3956 1520 WerFault.exe 108 4516 1944 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3504 3004 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 83 PID 3004 wrote to memory of 3504 3004 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 83 PID 3004 wrote to memory of 3504 3004 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 83 PID 3004 wrote to memory of 3504 3004 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 83 PID 3004 wrote to memory of 3504 3004 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 83 PID 3504 wrote to memory of 3436 3504 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 86 PID 3504 wrote to memory of 3436 3504 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 86 PID 3504 wrote to memory of 3436 3504 21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe 86 PID 3436 wrote to memory of 2152 3436 omsecor.exe 88 PID 3436 wrote to memory of 2152 3436 omsecor.exe 88 PID 3436 wrote to memory of 2152 3436 omsecor.exe 88 PID 3436 wrote to memory of 2152 3436 omsecor.exe 88 PID 3436 wrote to memory of 2152 3436 omsecor.exe 88 PID 2152 wrote to memory of 1520 2152 omsecor.exe 108 PID 2152 wrote to memory of 1520 2152 omsecor.exe 108 PID 2152 wrote to memory of 1520 2152 omsecor.exe 108 PID 1520 wrote to memory of 5096 1520 omsecor.exe 109 PID 1520 wrote to memory of 5096 1520 omsecor.exe 109 PID 1520 wrote to memory of 5096 1520 omsecor.exe 109 PID 1520 wrote to memory of 5096 1520 omsecor.exe 109 PID 1520 wrote to memory of 5096 1520 omsecor.exe 109 PID 5096 wrote to memory of 1944 5096 omsecor.exe 111 PID 5096 wrote to memory of 1944 5096 omsecor.exe 111 PID 5096 wrote to memory of 1944 5096 omsecor.exe 111 PID 1944 wrote to memory of 4568 1944 omsecor.exe 113 PID 1944 wrote to memory of 4568 1944 omsecor.exe 113 PID 1944 wrote to memory of 4568 1944 omsecor.exe 113 PID 1944 wrote to memory of 4568 1944 omsecor.exe 113 PID 1944 wrote to memory of 4568 1944 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe"C:\Users\Admin\AppData\Local\Temp\21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exeC:\Users\Admin\AppData\Local\Temp\21b0a8040e39963d792e841b2fe17492e4a9a8b9f962a8241ed1787839832164.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 2688⤵
- Program crash
PID:4516
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 2926⤵
- Program crash
PID:3956
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 2884⤵
- Program crash
PID:1464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 3002⤵
- Program crash
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3004 -ip 30041⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3436 -ip 34361⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1520 -ip 15201⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1944 -ip 19441⤵PID:3988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5debaee5209253b7e1351d8657230a503
SHA1191e90596881ca59995c24f50ad347d4e1d331c1
SHA2563f66162d8207b553ac4414754aee28f5310ed6a11f67f71bcdeb4147d5049d9f
SHA51292b74f2d96901d4b8ab888801f5fab27b454fc51990bd389b5b48aa82f4b005ea5496a89f95ff97682cd8249f211ab997a6e30abc2ab5767503d251043e742b5
-
Filesize
96KB
MD51228cbb817eccdc3ecd8405cf15beee9
SHA1ecb895cb6ef42d30e1ee5f76d8195ff3ba60a8a1
SHA256e37fd897f667c4c8f1c32b2988402cd78a63acd17afccd5d4b3735eb210dfbeb
SHA512dfa7539bc7c35c730ec2216919d65582b0c5708fc8a94df6066c1eddd7f875c8d18300499ecf5df74e63f8ab14ff9fc11366e075301ddf8896423c1aae05c4c6
-
Filesize
96KB
MD5773a8e292164cf347c04e1f942c5c90d
SHA12d085e5125b74a0827f13e3da3dd8088addca105
SHA256c7123f7501e1efc3a5b9d14e0fdba8b0eed81e0ff6058bfe2366307a161f69c4
SHA512996743b6dd73d16e8f47c6cf07c95f7054e8771df4dadb923ab62bac66ed7ae0a22403fef4fc6c1fb536f99b15c6ac71346155f40f4d97a7c38b31e85844e3b6