Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 07:38
Static task
static1
Behavioral task
behavioral1
Sample
813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe
Resource
win7-20240903-en
General
-
Target
813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe
-
Size
96KB
-
MD5
7fcd7e5707d004b75fb0760d1e26bb82
-
SHA1
0f7a4d3519bb949d4ce79640c88104acd4cabd10
-
SHA256
813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c
-
SHA512
4a678ace5c8cc26ca5b01cfa22be29de5c46479ce2c3b678f303a18ff0547233b0a7d12ac4f4e56cb4770c202d09a12a5beb47150c73164c5b6cda540e2f512a
-
SSDEEP
1536:unAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:uGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3520 omsecor.exe 1172 omsecor.exe 3324 omsecor.exe 3864 omsecor.exe 4412 omsecor.exe 2424 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2988 set thread context of 3108 2988 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 84 PID 3520 set thread context of 1172 3520 omsecor.exe 89 PID 3324 set thread context of 3864 3324 omsecor.exe 99 PID 4412 set thread context of 2424 4412 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 2076 2988 WerFault.exe 82 4152 3520 WerFault.exe 87 3868 3324 WerFault.exe 98 3952 4412 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3108 2988 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 84 PID 2988 wrote to memory of 3108 2988 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 84 PID 2988 wrote to memory of 3108 2988 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 84 PID 2988 wrote to memory of 3108 2988 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 84 PID 2988 wrote to memory of 3108 2988 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 84 PID 3108 wrote to memory of 3520 3108 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 87 PID 3108 wrote to memory of 3520 3108 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 87 PID 3108 wrote to memory of 3520 3108 813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe 87 PID 3520 wrote to memory of 1172 3520 omsecor.exe 89 PID 3520 wrote to memory of 1172 3520 omsecor.exe 89 PID 3520 wrote to memory of 1172 3520 omsecor.exe 89 PID 3520 wrote to memory of 1172 3520 omsecor.exe 89 PID 3520 wrote to memory of 1172 3520 omsecor.exe 89 PID 1172 wrote to memory of 3324 1172 omsecor.exe 98 PID 1172 wrote to memory of 3324 1172 omsecor.exe 98 PID 1172 wrote to memory of 3324 1172 omsecor.exe 98 PID 3324 wrote to memory of 3864 3324 omsecor.exe 99 PID 3324 wrote to memory of 3864 3324 omsecor.exe 99 PID 3324 wrote to memory of 3864 3324 omsecor.exe 99 PID 3324 wrote to memory of 3864 3324 omsecor.exe 99 PID 3324 wrote to memory of 3864 3324 omsecor.exe 99 PID 3864 wrote to memory of 4412 3864 omsecor.exe 101 PID 3864 wrote to memory of 4412 3864 omsecor.exe 101 PID 3864 wrote to memory of 4412 3864 omsecor.exe 101 PID 4412 wrote to memory of 2424 4412 omsecor.exe 103 PID 4412 wrote to memory of 2424 4412 omsecor.exe 103 PID 4412 wrote to memory of 2424 4412 omsecor.exe 103 PID 4412 wrote to memory of 2424 4412 omsecor.exe 103 PID 4412 wrote to memory of 2424 4412 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe"C:\Users\Admin\AppData\Local\Temp\813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exeC:\Users\Admin\AppData\Local\Temp\813bd52d23f1d483921ee2d2c667ebab1c7a8df0f17bfa78534b80699752353c.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 2568⤵
- Program crash
PID:3952
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 2766⤵
- Program crash
PID:3868
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 2884⤵
- Program crash
PID:4152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 2882⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2988 -ip 29881⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3520 -ip 35201⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3324 -ip 33241⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4412 -ip 44121⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5da488decbb181a77a787658592fc0b73
SHA1cddf220bb794c18782bb2ab403ed02b9a7f26ebf
SHA256912b29fe2f82eb2febbabe7e70bc3411219fe4399f32a0989793543aad033414
SHA5120c2b969b7f61fd9946aaeec9c68e436c03fbc175bdb4cb0ac8ed1492364410b747f0080bef9ef970a56028f1d8e2aed04f8d26330fb06b8414d7328b26b3872e
-
Filesize
96KB
MD537ba62fb8d62d2516ffbadb264bcc022
SHA1918072b2edc0a846ee3fa453b4e86fb99881ec17
SHA2565ae77db0fb0f80d57f81d20c8398563815892ccaaea5d7b19c9bf40e423027db
SHA512c75f652582c0b61ffa78f2a0a875a57d91769bfe4b38b26653bb6fca3f47a744d629a15160feba5c68559f91ceeb781015d2b715399b83044313319e4fdb05f4
-
Filesize
96KB
MD5aa7a3263feac2ac642acb2d2a4681629
SHA1b55234813effba2cafd1a8951557767b436d1f31
SHA2561bc716334ae7491bceaff47a003cabb75d269394aa1005cdd614a8ebf6f7d259
SHA51223cfe89c24013542017cfd83b9f765c8cf5b60f478943f71730a5655a796d7a6941026e9fdbdbae8d27944c9b1398b521062b529a9307af536474a0f4086cc05