Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 10:42
Static task
static1
Behavioral task
behavioral1
Sample
2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe
Resource
win7-20240903-en
General
-
Target
2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe
-
Size
96KB
-
MD5
e7a3c0cf7bf716cfee35c2c08c3775d4
-
SHA1
9ec9865b9fee7fc69ae242229a1eedabc751d6f5
-
SHA256
2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd
-
SHA512
a489560654819eafe3d23567d8bd4d45f27ad8eda548c04fec23fc576e724df87381d4f4d9d518681c4d81a83602895e09aa06845d3f6488409fb64cf91c800b
-
SSDEEP
1536:rnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:rGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1256 omsecor.exe 3848 omsecor.exe 2712 omsecor.exe 4644 omsecor.exe 3752 omsecor.exe 4312 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2584 set thread context of 1216 2584 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 83 PID 1256 set thread context of 3848 1256 omsecor.exe 87 PID 2712 set thread context of 4644 2712 omsecor.exe 108 PID 3752 set thread context of 4312 3752 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 2444 1256 WerFault.exe 86 4284 2584 WerFault.exe 82 3352 2712 WerFault.exe 107 3592 3752 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1216 2584 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 83 PID 2584 wrote to memory of 1216 2584 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 83 PID 2584 wrote to memory of 1216 2584 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 83 PID 2584 wrote to memory of 1216 2584 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 83 PID 2584 wrote to memory of 1216 2584 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 83 PID 1216 wrote to memory of 1256 1216 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 86 PID 1216 wrote to memory of 1256 1216 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 86 PID 1216 wrote to memory of 1256 1216 2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe 86 PID 1256 wrote to memory of 3848 1256 omsecor.exe 87 PID 1256 wrote to memory of 3848 1256 omsecor.exe 87 PID 1256 wrote to memory of 3848 1256 omsecor.exe 87 PID 1256 wrote to memory of 3848 1256 omsecor.exe 87 PID 1256 wrote to memory of 3848 1256 omsecor.exe 87 PID 3848 wrote to memory of 2712 3848 omsecor.exe 107 PID 3848 wrote to memory of 2712 3848 omsecor.exe 107 PID 3848 wrote to memory of 2712 3848 omsecor.exe 107 PID 2712 wrote to memory of 4644 2712 omsecor.exe 108 PID 2712 wrote to memory of 4644 2712 omsecor.exe 108 PID 2712 wrote to memory of 4644 2712 omsecor.exe 108 PID 2712 wrote to memory of 4644 2712 omsecor.exe 108 PID 2712 wrote to memory of 4644 2712 omsecor.exe 108 PID 4644 wrote to memory of 3752 4644 omsecor.exe 110 PID 4644 wrote to memory of 3752 4644 omsecor.exe 110 PID 4644 wrote to memory of 3752 4644 omsecor.exe 110 PID 3752 wrote to memory of 4312 3752 omsecor.exe 111 PID 3752 wrote to memory of 4312 3752 omsecor.exe 111 PID 3752 wrote to memory of 4312 3752 omsecor.exe 111 PID 3752 wrote to memory of 4312 3752 omsecor.exe 111 PID 3752 wrote to memory of 4312 3752 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe"C:\Users\Admin\AppData\Local\Temp\2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exeC:\Users\Admin\AppData\Local\Temp\2d1e7e34895262731f799b3778b771a83567d6317d08485d6b66715d29a8d2fd.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 2568⤵
- Program crash
PID:3592
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 2926⤵
- Program crash
PID:3352
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 2884⤵
- Program crash
PID:2444
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2882⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2584 -ip 25841⤵PID:1612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1256 -ip 12561⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2712 -ip 27121⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3752 -ip 37521⤵PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54a2941ffb56f1d6c8a7d6ce1143c3c1b
SHA1c6ffa151c58a77de16421447482210dd785c47d4
SHA2568aef3b373ce369b21309a8e623a869126d4aef31556bf3256ffe6a4d3915547a
SHA5122950dcf330f8e0237e9841cd63793630677018bfe035443dcc9ed3bf1343944b136eb55faa476bc1f0237e6374e8110d3ab722c2db4849b6d0389041c808f82c
-
Filesize
96KB
MD5e4465ce16d973d05df5222c430c4fe8e
SHA145a854100a05104ee86523abe58001e63d1ff5c2
SHA2560697f373079829a1dd10665030c9bbf8f21115d4fc78d73ad6b8c2f78e6cbd2c
SHA51299b226bd9cb361e26de817c97a6b397956b89d8fa9e04c7496a7a26b2e40b4c04c371a832f5ded0135213a5ab9d08beb36369465279ee659a47860c895a0f16f
-
Filesize
96KB
MD51e9504645bafc62fc9e9194067d36d43
SHA1403a1ff3b3388186cbaf6568d8083817fb02fabd
SHA256fdf69a4d6f39c3f18bd00c4afb43dffc655590d4e3decf9edcec34742f76d6f5
SHA512f0a7e261b00f136a6f8187350cc771c793b40f9cc2542150d33931f8b317583d4a3c12f9554ecea0a9ca7e6bbf36ad9dca65d2589bf83d74ecd7387650395dd2