Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 09:47
Static task
static1
Behavioral task
behavioral1
Sample
bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe
Resource
win7-20240729-en
General
-
Target
bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe
-
Size
96KB
-
MD5
457a82e3e0a146a22e9dbacd802b75e6
-
SHA1
3198f8c4b0b1fcf8a03f3f90e7e9bc70ddc4b5aa
-
SHA256
bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e
-
SHA512
1d89cc96d6edb9d7918b9de9fccaa91a7c8f8ee77d7c58f33f5877406189aede63167c950ab0408651da7619b773742e2945529a061ae08f3d6aa411e6f0912b
-
SSDEEP
1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:EGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2264 omsecor.exe 2204 omsecor.exe 4348 omsecor.exe 1928 omsecor.exe 3512 omsecor.exe 2940 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4052 set thread context of 1552 4052 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 83 PID 2264 set thread context of 2204 2264 omsecor.exe 88 PID 4348 set thread context of 1928 4348 omsecor.exe 108 PID 3512 set thread context of 2940 3512 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4808 4052 WerFault.exe 82 748 2264 WerFault.exe 85 748 4348 WerFault.exe 107 1868 3512 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4052 wrote to memory of 1552 4052 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 83 PID 4052 wrote to memory of 1552 4052 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 83 PID 4052 wrote to memory of 1552 4052 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 83 PID 4052 wrote to memory of 1552 4052 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 83 PID 4052 wrote to memory of 1552 4052 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 83 PID 1552 wrote to memory of 2264 1552 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 85 PID 1552 wrote to memory of 2264 1552 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 85 PID 1552 wrote to memory of 2264 1552 bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe 85 PID 2264 wrote to memory of 2204 2264 omsecor.exe 88 PID 2264 wrote to memory of 2204 2264 omsecor.exe 88 PID 2264 wrote to memory of 2204 2264 omsecor.exe 88 PID 2264 wrote to memory of 2204 2264 omsecor.exe 88 PID 2264 wrote to memory of 2204 2264 omsecor.exe 88 PID 2204 wrote to memory of 4348 2204 omsecor.exe 107 PID 2204 wrote to memory of 4348 2204 omsecor.exe 107 PID 2204 wrote to memory of 4348 2204 omsecor.exe 107 PID 4348 wrote to memory of 1928 4348 omsecor.exe 108 PID 4348 wrote to memory of 1928 4348 omsecor.exe 108 PID 4348 wrote to memory of 1928 4348 omsecor.exe 108 PID 4348 wrote to memory of 1928 4348 omsecor.exe 108 PID 4348 wrote to memory of 1928 4348 omsecor.exe 108 PID 1928 wrote to memory of 3512 1928 omsecor.exe 110 PID 1928 wrote to memory of 3512 1928 omsecor.exe 110 PID 1928 wrote to memory of 3512 1928 omsecor.exe 110 PID 3512 wrote to memory of 2940 3512 omsecor.exe 112 PID 3512 wrote to memory of 2940 3512 omsecor.exe 112 PID 3512 wrote to memory of 2940 3512 omsecor.exe 112 PID 3512 wrote to memory of 2940 3512 omsecor.exe 112 PID 3512 wrote to memory of 2940 3512 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe"C:\Users\Admin\AppData\Local\Temp\bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exeC:\Users\Admin\AppData\Local\Temp\bd462c8dcee8afb7bf8e0fc17cff9e4b431bf5f7219e38fa3f4357200207863e.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 2568⤵
- Program crash
PID:1868
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 2966⤵
- Program crash
PID:748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 3004⤵
- Program crash
PID:748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 3002⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4052 -ip 40521⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2264 -ip 22641⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4348 -ip 43481⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3512 -ip 35121⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e0386f235e317cf375cfcaf2609ddfce
SHA162c578aa55baaaca5a542db7d3af354222feec84
SHA256604e58519b07f554254264b2331bd79af5c5fbe7b62244ee28a67131490e4298
SHA5122729da3f238ee978d908f4265b099d67efd67f85c71a86bdf6acacba72a2e09ec69684ef71261b383710e7071dda79273cf35b98d5f09ebc103523ee6919ab65
-
Filesize
96KB
MD51877fee05d1d7194a2b666097bed2003
SHA1c1e16075caa495602758216adeee5a4a59d782d8
SHA25636140d63698d9294fb0f1663a370e0b3b5627ae6357a6f43fb2d914394a48823
SHA512ecd404c1e3798c86ad7a52ce2d1a9bf9bf688f13655caf7e9832c4083f32e10f0d430785b6b5afbc83060fa370822e75f073d7b19739dbea3f007181395d7d7f
-
Filesize
96KB
MD56929647e137fbc68a5583bde0837d658
SHA172c2f4dd6bf34687985fcb9dd8f75cf66a6a6529
SHA256a5eca2ac9d815f7af1073e0909d38ca2ff22b240f4941ae46bcb13e46397b57f
SHA512bf3243506d23b315eadc40ad5c7988947b24fc748e3b4ae4a726057b79df439d99e192d2b705e564cd22798dc243d16f3dcaa73bdd2e0b5efe37bb2739be11f6