Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe
Resource
win7-20240903-en
General
-
Target
d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe
-
Size
96KB
-
MD5
78a061fad4189f343fcecc7875495c0c
-
SHA1
7103bafd20528fe2c8bc3aa252fb1f0fdf00d90d
-
SHA256
d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2
-
SHA512
954ff5b8eb6996f0d61a26bf2ac07475dd2e1d66989c0afd658ef59baba0c54578461701fdb3bf2360665426970cd39e7b761fa3c07413bfd53323750ea83345
-
SSDEEP
1536:OnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:OGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2348 omsecor.exe 668 omsecor.exe 428 omsecor.exe 3592 omsecor.exe 216 omsecor.exe 4108 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2584 set thread context of 3684 2584 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 85 PID 2348 set thread context of 668 2348 omsecor.exe 90 PID 428 set thread context of 3592 428 omsecor.exe 98 PID 216 set thread context of 4108 216 omsecor.exe 102 -
Program crash 4 IoCs
pid pid_target Process procid_target 2812 2584 WerFault.exe 82 3640 2348 WerFault.exe 88 3044 428 WerFault.exe 97 1820 216 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2584 wrote to memory of 3684 2584 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 85 PID 2584 wrote to memory of 3684 2584 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 85 PID 2584 wrote to memory of 3684 2584 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 85 PID 2584 wrote to memory of 3684 2584 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 85 PID 2584 wrote to memory of 3684 2584 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 85 PID 3684 wrote to memory of 2348 3684 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 88 PID 3684 wrote to memory of 2348 3684 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 88 PID 3684 wrote to memory of 2348 3684 d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe 88 PID 2348 wrote to memory of 668 2348 omsecor.exe 90 PID 2348 wrote to memory of 668 2348 omsecor.exe 90 PID 2348 wrote to memory of 668 2348 omsecor.exe 90 PID 2348 wrote to memory of 668 2348 omsecor.exe 90 PID 2348 wrote to memory of 668 2348 omsecor.exe 90 PID 668 wrote to memory of 428 668 omsecor.exe 97 PID 668 wrote to memory of 428 668 omsecor.exe 97 PID 668 wrote to memory of 428 668 omsecor.exe 97 PID 428 wrote to memory of 3592 428 omsecor.exe 98 PID 428 wrote to memory of 3592 428 omsecor.exe 98 PID 428 wrote to memory of 3592 428 omsecor.exe 98 PID 428 wrote to memory of 3592 428 omsecor.exe 98 PID 428 wrote to memory of 3592 428 omsecor.exe 98 PID 3592 wrote to memory of 216 3592 omsecor.exe 100 PID 3592 wrote to memory of 216 3592 omsecor.exe 100 PID 3592 wrote to memory of 216 3592 omsecor.exe 100 PID 216 wrote to memory of 4108 216 omsecor.exe 102 PID 216 wrote to memory of 4108 216 omsecor.exe 102 PID 216 wrote to memory of 4108 216 omsecor.exe 102 PID 216 wrote to memory of 4108 216 omsecor.exe 102 PID 216 wrote to memory of 4108 216 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe"C:\Users\Admin\AppData\Local\Temp\d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exeC:\Users\Admin\AppData\Local\Temp\d998c3692501dd8efb02f7286e8f7d6d6d424e8ccc1ae0523796c1256d23fcb2.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 2568⤵
- Program crash
PID:1820
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 2926⤵
- Program crash
PID:3044
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 3124⤵
- Program crash
PID:3640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2882⤵
- Program crash
PID:2812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2584 -ip 25841⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2348 -ip 23481⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 428 -ip 4281⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 216 -ip 2161⤵PID:2564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD506cca3a912328de24a997f32f868a2b5
SHA1a2b53f2ba51f525dc6b29abc89d3631e88a698da
SHA2567ce40d7eb1e07646c2268e40c8a483bdb27e2ca35e090be46a5518b8fb986771
SHA512b333176db490086327ccb71ed613ab05340e0658ea5a883cd500be201caaf2c7ff7a9ee45d170dfd11af0f20a7bd857e43eafcc04363047ab837e38b2ae31670
-
Filesize
96KB
MD55f607c56e2fe3ca072825993fb611a44
SHA1000d9c306bf15861bac1a1757b6f312dd5a6f09e
SHA256f52f26a20abf5baa956e227de6dadc2ed197a7ec061a10131b685a1b87d60ba4
SHA51271d5acc2f0db426fc7d65995da7346bb229ccbd8e9688659c9c97e73de81d0273b59c166899ee68469122c2e00dafe5029fad9655294c51a9dbc306dc0d59da6
-
Filesize
96KB
MD5074ff67bf351bed925ce0050a233ab2d
SHA158d589391d2374b3045cae7ec55627daa8b25549
SHA256e296a07ace92d8fecf76d6d3913bec883ba5ac58b6490cbdd1cf995674919ce2
SHA5125794a5684655d7e44e914f11ca897c8c0b7dc117b286c005d9aaf675b4883ef4eeb193364748a02d121fdefab17e5298abafd9392d3329e9097f77d7125eac82