Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 01:14
Static task
static1
Behavioral task
behavioral1
Sample
6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe
Resource
win7-20241010-en
General
-
Target
6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe
-
Size
96KB
-
MD5
df306060b85493b71c7a9c79eef00619
-
SHA1
1d273403f55aba0a9d851a0952d18553022f550c
-
SHA256
6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553
-
SHA512
98e8c95a1bde23f4ad831ac696e9a6d394355d30ed550403f69c6cad04620b33df2a27433d5aa1b92079550720e08ed2b8064d849ab61299e687125853a99d17
-
SSDEEP
1536:RnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:RGs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4404 omsecor.exe 5088 omsecor.exe 3856 omsecor.exe 1140 omsecor.exe 2088 omsecor.exe 3356 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2420 set thread context of 3684 2420 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 83 PID 4404 set thread context of 5088 4404 omsecor.exe 87 PID 3856 set thread context of 1140 3856 omsecor.exe 108 PID 2088 set thread context of 3356 2088 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 404 2420 WerFault.exe 82 464 4404 WerFault.exe 85 3528 3856 WerFault.exe 107 4520 2088 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2420 wrote to memory of 3684 2420 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 83 PID 2420 wrote to memory of 3684 2420 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 83 PID 2420 wrote to memory of 3684 2420 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 83 PID 2420 wrote to memory of 3684 2420 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 83 PID 2420 wrote to memory of 3684 2420 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 83 PID 3684 wrote to memory of 4404 3684 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 85 PID 3684 wrote to memory of 4404 3684 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 85 PID 3684 wrote to memory of 4404 3684 6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe 85 PID 4404 wrote to memory of 5088 4404 omsecor.exe 87 PID 4404 wrote to memory of 5088 4404 omsecor.exe 87 PID 4404 wrote to memory of 5088 4404 omsecor.exe 87 PID 4404 wrote to memory of 5088 4404 omsecor.exe 87 PID 4404 wrote to memory of 5088 4404 omsecor.exe 87 PID 5088 wrote to memory of 3856 5088 omsecor.exe 107 PID 5088 wrote to memory of 3856 5088 omsecor.exe 107 PID 5088 wrote to memory of 3856 5088 omsecor.exe 107 PID 3856 wrote to memory of 1140 3856 omsecor.exe 108 PID 3856 wrote to memory of 1140 3856 omsecor.exe 108 PID 3856 wrote to memory of 1140 3856 omsecor.exe 108 PID 3856 wrote to memory of 1140 3856 omsecor.exe 108 PID 3856 wrote to memory of 1140 3856 omsecor.exe 108 PID 1140 wrote to memory of 2088 1140 omsecor.exe 110 PID 1140 wrote to memory of 2088 1140 omsecor.exe 110 PID 1140 wrote to memory of 2088 1140 omsecor.exe 110 PID 2088 wrote to memory of 3356 2088 omsecor.exe 112 PID 2088 wrote to memory of 3356 2088 omsecor.exe 112 PID 2088 wrote to memory of 3356 2088 omsecor.exe 112 PID 2088 wrote to memory of 3356 2088 omsecor.exe 112 PID 2088 wrote to memory of 3356 2088 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe"C:\Users\Admin\AppData\Local\Temp\6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exeC:\Users\Admin\AppData\Local\Temp\6bd01e0e132d8636a63b62930e8934b2388ce9bd9eab5799d979604d79d19553.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 2568⤵
- Program crash
PID:4520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 2926⤵
- Program crash
PID:3528
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2884⤵
- Program crash
PID:464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 2882⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2420 -ip 24201⤵PID:4964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4404 -ip 44041⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3856 -ip 38561⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2088 -ip 20881⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD595acb858322323eb6fe1dfa905e2517e
SHA1d5cf1c4c919b49aadb53f9f176b88f4c4dc9c0f2
SHA256367dbee6fe2755c16ad757081fa15cb75895cadc6ddfcf6dd5c0ad3afd2f78f9
SHA5121ca783cfb84630ec1ed3f0afe0e3ee6382dfe482971ded0d44ae4017223baac4b2dba0327c6409549199a34dd08e9fa2c1d3c52ba1bbf06a49ebe73ad72b53f7
-
Filesize
96KB
MD57e3c477d0c26934e62ac496f1a552ccd
SHA1a9ec0d7eac5b887a026f4f43423ba36a769bf450
SHA256cb81276fc27fce16497d0e212153e2dfd4380f115413991212ac44589e92ba94
SHA5125fc33534b58518686048a947b8e1b71a8c5efbcffcb15c67467d6cb02c90178c07f414ef3ef5e47dbcced1bd6481ddbdd8e2cd377170d083ed7cd5b92645e124
-
Filesize
96KB
MD52c0c6b3d3a64ae528f6c0d72321779d7
SHA16443e81cc625d35d1f9af9a1464a4722f6357d54
SHA2560a7d86e8fdd5cadadc5a89cfdcf413d9bddd74bc298ceed882e2b78e497c4d5f
SHA512b7500748c8f69fed4d4fa655647bea81b94fd28ecd2cd4c29aca658a3cb86aa055c3953ef240d379b23a5e522d5efffb368f3a1711fea1322be6bdc29303cfb7