Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 13:08
Static task
static1
Behavioral task
behavioral1
Sample
b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe
Resource
win7-20240903-en
General
-
Target
b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe
-
Size
96KB
-
MD5
82ec32e61d3cc855216c94aad2018f85
-
SHA1
95032b286624fc8c10a48a2c4ec163b0d695976e
-
SHA256
b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385
-
SHA512
0b5c54953891e065906f62d65afc9f3ca7684ed7ed578ade6a7e32e6f378bca823045de58f3ee303838da179f52d98eb8f6fcc3881a6979628beab961778f013
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:MGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3408 omsecor.exe 4848 omsecor.exe 4156 omsecor.exe 3828 omsecor.exe 4184 omsecor.exe 724 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4828 set thread context of 3048 4828 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 84 PID 3408 set thread context of 4848 3408 omsecor.exe 89 PID 4156 set thread context of 3828 4156 omsecor.exe 100 PID 4184 set thread context of 724 4184 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2988 4828 WerFault.exe 82 4476 3408 WerFault.exe 87 4764 4156 WerFault.exe 99 4800 4184 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3048 4828 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 84 PID 4828 wrote to memory of 3048 4828 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 84 PID 4828 wrote to memory of 3048 4828 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 84 PID 4828 wrote to memory of 3048 4828 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 84 PID 4828 wrote to memory of 3048 4828 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 84 PID 3048 wrote to memory of 3408 3048 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 87 PID 3048 wrote to memory of 3408 3048 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 87 PID 3048 wrote to memory of 3408 3048 b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe 87 PID 3408 wrote to memory of 4848 3408 omsecor.exe 89 PID 3408 wrote to memory of 4848 3408 omsecor.exe 89 PID 3408 wrote to memory of 4848 3408 omsecor.exe 89 PID 3408 wrote to memory of 4848 3408 omsecor.exe 89 PID 3408 wrote to memory of 4848 3408 omsecor.exe 89 PID 4848 wrote to memory of 4156 4848 omsecor.exe 99 PID 4848 wrote to memory of 4156 4848 omsecor.exe 99 PID 4848 wrote to memory of 4156 4848 omsecor.exe 99 PID 4156 wrote to memory of 3828 4156 omsecor.exe 100 PID 4156 wrote to memory of 3828 4156 omsecor.exe 100 PID 4156 wrote to memory of 3828 4156 omsecor.exe 100 PID 4156 wrote to memory of 3828 4156 omsecor.exe 100 PID 4156 wrote to memory of 3828 4156 omsecor.exe 100 PID 3828 wrote to memory of 4184 3828 omsecor.exe 102 PID 3828 wrote to memory of 4184 3828 omsecor.exe 102 PID 3828 wrote to memory of 4184 3828 omsecor.exe 102 PID 4184 wrote to memory of 724 4184 omsecor.exe 104 PID 4184 wrote to memory of 724 4184 omsecor.exe 104 PID 4184 wrote to memory of 724 4184 omsecor.exe 104 PID 4184 wrote to memory of 724 4184 omsecor.exe 104 PID 4184 wrote to memory of 724 4184 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe"C:\Users\Admin\AppData\Local\Temp\b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exeC:\Users\Admin\AppData\Local\Temp\b0532102e3eea6533b32da4111ab68cf3649b75f06244cb35c68c6506fb49385.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 2568⤵
- Program crash
PID:4800
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1766⤵
- Program crash
PID:4764
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 2884⤵
- Program crash
PID:4476
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 2882⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4828 -ip 48281⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3408 -ip 34081⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4156 -ip 41561⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4184 -ip 41841⤵PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b4edde9ecce673eb4f02b16fb9ef291d
SHA19e81626129858fc9c02e9fac95ccc592bced1b57
SHA256c94288e71549ed0d3cdc1385f7ed36eb1b4517b49411c1bf967f963cebf6bb41
SHA512d40f4fd78a894ef75e4f0a3c3e9bc6d720aa2980af72b437f144d86e28850ce4798dff1aaf2fc84fca135ccbb60fbfb18387cf83626a50e9e57906e79c67f17f
-
Filesize
96KB
MD5fe5d1eac509b79a54c0f74678aeacff1
SHA17bf42341f2646062eda3931ccdc57eb6a6b931bb
SHA256667a507d15656585f7d65f7164ed985337bdeb06e1889c91c5bd98b51340a92f
SHA5126fcd3f785e455a869b4d57e956a31636dab1c7ea6a6e0027f4749949bda2ad1cba7ac042fd987e9f3809798f7a6c38be3de0fb292e8b06253fdf29ddc96d10ee
-
Filesize
96KB
MD565166ce1bf66caab7ff9d5d553b1783d
SHA1d6079fb24284deaa29cf0ade4408db52093a390f
SHA25619a84441e9753e80b9a62ab0a6fe1d6ec6864e89700386df1a91a65bb4873007
SHA5127b737e3e9798e78b349608a728ca5fe9970b5761968abf44ef7664a64c707d33b55cf4736466ece3d5d4c089e56916182c89626d4fd93e8660b3380ad7acde4f