Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 21:28
Static task
static1
Behavioral task
behavioral1
Sample
f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe
Resource
win7-20241010-en
General
-
Target
f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe
-
Size
96KB
-
MD5
259ab1d3bccdf0c804bc85e2989abbe8
-
SHA1
675d88b782b4e9239d4a4f6d1173c74ecec23221
-
SHA256
f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc
-
SHA512
06ebf6cf3f8886b1ba8bd91162e7b0c442798fa703ca5a1ad5d40d6d9dae38e43e447387f9251f310502de97466e0c6eb88b3a49fb727fa5c9e5cc4ef7cd2fad
-
SSDEEP
1536:4nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:4Gs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1348 omsecor.exe 4740 omsecor.exe 3700 omsecor.exe 4648 omsecor.exe 3324 omsecor.exe 4288 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3052 set thread context of 2764 3052 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 83 PID 1348 set thread context of 4740 1348 omsecor.exe 88 PID 3700 set thread context of 4648 3700 omsecor.exe 109 PID 3324 set thread context of 4288 3324 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3260 3052 WerFault.exe 82 4104 1348 WerFault.exe 86 3608 3700 WerFault.exe 108 1808 3324 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2764 3052 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 83 PID 3052 wrote to memory of 2764 3052 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 83 PID 3052 wrote to memory of 2764 3052 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 83 PID 3052 wrote to memory of 2764 3052 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 83 PID 3052 wrote to memory of 2764 3052 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 83 PID 2764 wrote to memory of 1348 2764 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 86 PID 2764 wrote to memory of 1348 2764 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 86 PID 2764 wrote to memory of 1348 2764 f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe 86 PID 1348 wrote to memory of 4740 1348 omsecor.exe 88 PID 1348 wrote to memory of 4740 1348 omsecor.exe 88 PID 1348 wrote to memory of 4740 1348 omsecor.exe 88 PID 1348 wrote to memory of 4740 1348 omsecor.exe 88 PID 1348 wrote to memory of 4740 1348 omsecor.exe 88 PID 4740 wrote to memory of 3700 4740 omsecor.exe 108 PID 4740 wrote to memory of 3700 4740 omsecor.exe 108 PID 4740 wrote to memory of 3700 4740 omsecor.exe 108 PID 3700 wrote to memory of 4648 3700 omsecor.exe 109 PID 3700 wrote to memory of 4648 3700 omsecor.exe 109 PID 3700 wrote to memory of 4648 3700 omsecor.exe 109 PID 3700 wrote to memory of 4648 3700 omsecor.exe 109 PID 3700 wrote to memory of 4648 3700 omsecor.exe 109 PID 4648 wrote to memory of 3324 4648 omsecor.exe 111 PID 4648 wrote to memory of 3324 4648 omsecor.exe 111 PID 4648 wrote to memory of 3324 4648 omsecor.exe 111 PID 3324 wrote to memory of 4288 3324 omsecor.exe 113 PID 3324 wrote to memory of 4288 3324 omsecor.exe 113 PID 3324 wrote to memory of 4288 3324 omsecor.exe 113 PID 3324 wrote to memory of 4288 3324 omsecor.exe 113 PID 3324 wrote to memory of 4288 3324 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe"C:\Users\Admin\AppData\Local\Temp\f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exeC:\Users\Admin\AppData\Local\Temp\f62dd28b70e286b2e2a82d2a78ceba0816397a929971d62a0f363da4ffc728dc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 2448⤵
- Program crash
PID:1808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 2926⤵
- Program crash
PID:3608
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 2884⤵
- Program crash
PID:4104
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2882⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3052 -ip 30521⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1348 -ip 13481⤵PID:3760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3700 -ip 37001⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3324 -ip 33241⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD579cdf281f091f2ee5d8be79a56fa0001
SHA1710fe8df20fe5c711f1e03d0a6e61016c205160a
SHA25660ac0108d88be04cd1226e5969e1868c66839c593faecf123b917f6a1481ba54
SHA512323de23bb0351c5bdf1ad4f0ba2d2ebd96b6daaed24103b63a4948164e7481a6631965257e31c08ec9123400ad2ff6d5dc0b3c41572cca88682a0d00d9bd3819
-
Filesize
96KB
MD55b4241b36e7e17dba104731ed4d36b3b
SHA1c9001ea16bec66a1cb6170028b184e64d9bb8985
SHA256f404305a3f6c169aaaef46388d439021004ffecf2351c4c44321db0c677c2ea0
SHA512947910b55bfbd8117d2b6e623b42297172381170e3eb5a023d955ff505778012e71d28b0cffe68b93a6c33931d8857193ae87f5255b671740620ee544740edaf
-
Filesize
96KB
MD586aa0b0eda6c2cf9274231943f74763c
SHA13cf5c3a6531695a228818b34165d3c1730feb696
SHA256e388ace1b4a692c2ac7276e78d7b0fd1d7f826e728436ba68aba78f267da886c
SHA5128c0a7298bc9b7bf932c531e6346cf9081342e02d7f49ce5191e0902282c317551705b2ef153eded8805b8e8598099e2060c38e1447b4a2e00770672525452193