Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 11:23
Static task
static1
Behavioral task
behavioral1
Sample
fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe
Resource
win7-20240903-en
General
-
Target
fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe
-
Size
96KB
-
MD5
62e4558b0fdffc45964bb16a5a23a5ee
-
SHA1
fb067f4423b7c85df8565b27ff015fa5f8e35b23
-
SHA256
fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d
-
SHA512
7ccecace029db244772aa3637b9b6bb283ddaacbdde08cbc6e95290fdd790a2cd0be97b37ae7478a4b1dd443365ef87b561fa369e5b5a562b33506509417ede9
-
SSDEEP
1536:4nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:4Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1824 omsecor.exe 4884 omsecor.exe 3084 omsecor.exe 4672 omsecor.exe 3684 omsecor.exe 1000 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2440 set thread context of 1216 2440 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 83 PID 1824 set thread context of 4884 1824 omsecor.exe 88 PID 3084 set thread context of 4672 3084 omsecor.exe 108 PID 3684 set thread context of 1000 3684 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 1068 2440 WerFault.exe 82 1108 1824 WerFault.exe 86 3004 3084 WerFault.exe 107 1576 3684 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1216 2440 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 83 PID 2440 wrote to memory of 1216 2440 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 83 PID 2440 wrote to memory of 1216 2440 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 83 PID 2440 wrote to memory of 1216 2440 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 83 PID 2440 wrote to memory of 1216 2440 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 83 PID 1216 wrote to memory of 1824 1216 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 86 PID 1216 wrote to memory of 1824 1216 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 86 PID 1216 wrote to memory of 1824 1216 fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe 86 PID 1824 wrote to memory of 4884 1824 omsecor.exe 88 PID 1824 wrote to memory of 4884 1824 omsecor.exe 88 PID 1824 wrote to memory of 4884 1824 omsecor.exe 88 PID 1824 wrote to memory of 4884 1824 omsecor.exe 88 PID 1824 wrote to memory of 4884 1824 omsecor.exe 88 PID 4884 wrote to memory of 3084 4884 omsecor.exe 107 PID 4884 wrote to memory of 3084 4884 omsecor.exe 107 PID 4884 wrote to memory of 3084 4884 omsecor.exe 107 PID 3084 wrote to memory of 4672 3084 omsecor.exe 108 PID 3084 wrote to memory of 4672 3084 omsecor.exe 108 PID 3084 wrote to memory of 4672 3084 omsecor.exe 108 PID 3084 wrote to memory of 4672 3084 omsecor.exe 108 PID 3084 wrote to memory of 4672 3084 omsecor.exe 108 PID 4672 wrote to memory of 3684 4672 omsecor.exe 110 PID 4672 wrote to memory of 3684 4672 omsecor.exe 110 PID 4672 wrote to memory of 3684 4672 omsecor.exe 110 PID 3684 wrote to memory of 1000 3684 omsecor.exe 112 PID 3684 wrote to memory of 1000 3684 omsecor.exe 112 PID 3684 wrote to memory of 1000 3684 omsecor.exe 112 PID 3684 wrote to memory of 1000 3684 omsecor.exe 112 PID 3684 wrote to memory of 1000 3684 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe"C:\Users\Admin\AppData\Local\Temp\fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exeC:\Users\Admin\AppData\Local\Temp\fbed82a4fea09b2eab3bf28e53ae1e425cb5256b943af573534c01414a599c0d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 2608⤵
- Program crash
PID:1576
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 3006⤵
- Program crash
PID:3004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 2924⤵
- Program crash
PID:1108
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 3002⤵
- Program crash
PID:1068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2440 -ip 24401⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1824 -ip 18241⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3084 -ip 30841⤵PID:468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3684 -ip 36841⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b51685eef353d07ded86760aeada6afe
SHA1e0fb5bfa26993945e2b20fb4f7c69b09ccfb1433
SHA25602d3fafed3628790eac03655e7f53daeac2fa42da91576655c51020f98ac66be
SHA5123c7fd1b643e063a3b5d4f570b4d7ee7bbf84744abfd0f645e4de802e87728d980db406835938a950fa3fe9ea7e02eab2bc581681b251e177dc45af73ecec9aca
-
Filesize
96KB
MD56fe5522c701c5b1122616b91652e5dd6
SHA140edd3e6c6c94ef5af55ec00ab03dbe40598da57
SHA25668afc70600a8bad5dd5d95a6c0342032075a25189d0b720cbb1c1699da34dc82
SHA51229d2553011fd17f280a5e7f8538b734d0d0d0d40d0964ca33f6c293d59da4d78071ad8da9495a9dbd06a7e8b8da61e515e201f7ea25c3a83765c753b801bfaaa
-
Filesize
96KB
MD5f592e427570965bf50eef06430c69aa2
SHA12327c61f75bd672c6b81b4c372dfe476fdef821d
SHA256c9ab72f08f1f072358f55b70a78b17efededc6b4481d2abe67c5c7eba951ad60
SHA5129067064129b673ca01b2c2b556ee71d0fd16574f7f7be1b6eaf3db700eb5ea5434d11a247f8e7d3c9d1d4f3c64fe189546973ecb18bdec72301fcfda9b96b5a3