Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe
Resource
win7-20250207-en
General
-
Target
dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe
-
Size
96KB
-
MD5
42939f6d36616455ed6b192023e46298
-
SHA1
a11a300473c0ebb1029157676f82066879fa9d63
-
SHA256
dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b
-
SHA512
901f271293e63035ad26ee291fc9d9da6e46471901f982da228e886fc19669590b213d12ccb1a435cce0fe3f55432a390185c6c829c341633ecb73eb09c65996
-
SSDEEP
1536:DnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxZ:DGs8cd8eXlYairZYqMddH13Z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1688 omsecor.exe 3296 omsecor.exe 4828 omsecor.exe 1848 omsecor.exe 1628 omsecor.exe 3684 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4720 set thread context of 1156 4720 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 83 PID 1688 set thread context of 3296 1688 omsecor.exe 88 PID 4828 set thread context of 1848 4828 omsecor.exe 105 PID 1628 set thread context of 3684 1628 omsecor.exe 108 -
Program crash 4 IoCs
pid pid_target Process procid_target 2928 4720 WerFault.exe 81 4404 1688 WerFault.exe 86 2736 4828 WerFault.exe 104 3344 1628 WerFault.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4720 wrote to memory of 1156 4720 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 83 PID 4720 wrote to memory of 1156 4720 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 83 PID 4720 wrote to memory of 1156 4720 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 83 PID 4720 wrote to memory of 1156 4720 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 83 PID 4720 wrote to memory of 1156 4720 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 83 PID 1156 wrote to memory of 1688 1156 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 86 PID 1156 wrote to memory of 1688 1156 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 86 PID 1156 wrote to memory of 1688 1156 dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe 86 PID 1688 wrote to memory of 3296 1688 omsecor.exe 88 PID 1688 wrote to memory of 3296 1688 omsecor.exe 88 PID 1688 wrote to memory of 3296 1688 omsecor.exe 88 PID 1688 wrote to memory of 3296 1688 omsecor.exe 88 PID 1688 wrote to memory of 3296 1688 omsecor.exe 88 PID 3296 wrote to memory of 4828 3296 omsecor.exe 104 PID 3296 wrote to memory of 4828 3296 omsecor.exe 104 PID 3296 wrote to memory of 4828 3296 omsecor.exe 104 PID 4828 wrote to memory of 1848 4828 omsecor.exe 105 PID 4828 wrote to memory of 1848 4828 omsecor.exe 105 PID 4828 wrote to memory of 1848 4828 omsecor.exe 105 PID 4828 wrote to memory of 1848 4828 omsecor.exe 105 PID 4828 wrote to memory of 1848 4828 omsecor.exe 105 PID 1848 wrote to memory of 1628 1848 omsecor.exe 107 PID 1848 wrote to memory of 1628 1848 omsecor.exe 107 PID 1848 wrote to memory of 1628 1848 omsecor.exe 107 PID 1628 wrote to memory of 3684 1628 omsecor.exe 108 PID 1628 wrote to memory of 3684 1628 omsecor.exe 108 PID 1628 wrote to memory of 3684 1628 omsecor.exe 108 PID 1628 wrote to memory of 3684 1628 omsecor.exe 108 PID 1628 wrote to memory of 3684 1628 omsecor.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe"C:\Users\Admin\AppData\Local\Temp\dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exeC:\Users\Admin\AppData\Local\Temp\dd2643e243a2b100d23002604a1c5f5ee2a88665930628a6b46571cbd3d5544b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 2688⤵
- Program crash
PID:3344
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 3006⤵
- Program crash
PID:2736
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 3004⤵
- Program crash
PID:4404
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 3002⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4720 -ip 47201⤵PID:3472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1688 -ip 16881⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4828 -ip 48281⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1628 -ip 16281⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53f54e81ea5e524dc3336742fb5a5622b
SHA11d0c3e111a2a6802f88e4edcbd056b3a7d8040ff
SHA25669532e541672e3ee1e71007037ac0e083a01a87cc6b56266c53289d3a6fb5672
SHA512ae3c483fa6adf05c335b0b24d86eec351b773540a7669e9d39f3713b4ec48f505dae838d6c08399f4089917d8355da2828aa88aec20e7b33bc1ad5207354966b
-
Filesize
96KB
MD517bdaea69479f4246cf4630cc1245c46
SHA12f9f6f481b503b9b3446499fec63cd30c72132d4
SHA2567d205f06bcae088be89305612b8cd231bcd89fef8ab92891020829f6dba26b16
SHA512fd65a820f7035941f0afe967ad21090b99a868f85eea70a5bae999533b148dcb3f034b5ee8a63a805e119aea103f539fbc5cfa21ea44858590f5af3e917695e6
-
Filesize
96KB
MD5e633537063f9e357aa097c4e60ffd592
SHA1f05aed8d3a43c5b495701a685fe589813e439ba6
SHA2568439fda8d18489b9c5dbca1f99f91e4f8bc7ffc778662a9c6e60887c2105d8fa
SHA5123adca50d3696823ee9f91fd7b7ec8196e30c02bdb53eca8c800f58d32e6a7cda5b05400e3de29640f3a3b7b724fc1d967f7238fb15b3c73e02daac331d25977a