Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe
Resource
win7-20240903-en
General
-
Target
29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe
-
Size
96KB
-
MD5
686314d255c8dc7433a5589a68e2118f
-
SHA1
3bd6ad33bb317458e972e942e122a534b5dc2f8f
-
SHA256
29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc
-
SHA512
99a26a74d6e01acc6693298e1241ec5681bfb4b24797e76202bcac7db757f7e741b1bf4344aa7a75c9944d52d251db8e72c11711769e75f0035f6cc8ae36da48
-
SSDEEP
1536:0nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:0Gs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1636 omsecor.exe 888 omsecor.exe 3272 omsecor.exe 4436 omsecor.exe 4052 omsecor.exe 1392 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1524 set thread context of 1004 1524 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 83 PID 1636 set thread context of 888 1636 omsecor.exe 87 PID 3272 set thread context of 4436 3272 omsecor.exe 105 PID 4052 set thread context of 1392 4052 omsecor.exe 108 -
Program crash 4 IoCs
pid pid_target Process procid_target 3972 1524 WerFault.exe 82 3180 1636 WerFault.exe 86 4456 3272 WerFault.exe 104 1628 4052 WerFault.exe 107 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1524 wrote to memory of 1004 1524 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 83 PID 1524 wrote to memory of 1004 1524 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 83 PID 1524 wrote to memory of 1004 1524 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 83 PID 1524 wrote to memory of 1004 1524 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 83 PID 1524 wrote to memory of 1004 1524 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 83 PID 1004 wrote to memory of 1636 1004 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 86 PID 1004 wrote to memory of 1636 1004 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 86 PID 1004 wrote to memory of 1636 1004 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 86 PID 1636 wrote to memory of 888 1636 omsecor.exe 87 PID 1636 wrote to memory of 888 1636 omsecor.exe 87 PID 1636 wrote to memory of 888 1636 omsecor.exe 87 PID 1636 wrote to memory of 888 1636 omsecor.exe 87 PID 1636 wrote to memory of 888 1636 omsecor.exe 87 PID 888 wrote to memory of 3272 888 omsecor.exe 104 PID 888 wrote to memory of 3272 888 omsecor.exe 104 PID 888 wrote to memory of 3272 888 omsecor.exe 104 PID 3272 wrote to memory of 4436 3272 omsecor.exe 105 PID 3272 wrote to memory of 4436 3272 omsecor.exe 105 PID 3272 wrote to memory of 4436 3272 omsecor.exe 105 PID 3272 wrote to memory of 4436 3272 omsecor.exe 105 PID 3272 wrote to memory of 4436 3272 omsecor.exe 105 PID 4436 wrote to memory of 4052 4436 omsecor.exe 107 PID 4436 wrote to memory of 4052 4436 omsecor.exe 107 PID 4436 wrote to memory of 4052 4436 omsecor.exe 107 PID 4052 wrote to memory of 1392 4052 omsecor.exe 108 PID 4052 wrote to memory of 1392 4052 omsecor.exe 108 PID 4052 wrote to memory of 1392 4052 omsecor.exe 108 PID 4052 wrote to memory of 1392 4052 omsecor.exe 108 PID 4052 wrote to memory of 1392 4052 omsecor.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe"C:\Users\Admin\AppData\Local\Temp\29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exeC:\Users\Admin\AppData\Local\Temp\29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 2568⤵
- Program crash
PID:1628
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 2926⤵
- Program crash
PID:4456
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 2884⤵
- Program crash
PID:3180
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 2882⤵
- Program crash
PID:3972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1524 -ip 15241⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1636 -ip 16361⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3272 -ip 32721⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4052 -ip 40521⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c133718f5887eb66b9440a6747f2fe36
SHA116f651de5950ab8ec69021b05fff6a98c737a28a
SHA2560e0404cdc5f38028d9458c866b87166d41e121bd25ea4c5c26b8bda4b910b7e7
SHA512058f922dcb7b81f478bed79aa154c002633714dfb6f630363c82585306639331582a1fe3e667efb0304302183427640be461e5217c62c5b427aedcdb4ff01351
-
Filesize
96KB
MD529b1b355833da1b72a5b3feed6b5e592
SHA1e17a9b47aa5f75964084cd12a014779c141c8e28
SHA25602adf171a2181bcfbc1c428b3e30c76df58bcc6aa674348236bd2f3408a07d25
SHA51280071b57966561419d8ec9091d0eb44a4cd5f811796a274944c0f0580731f1523d1d2e2602b8522d30f3c10bd16e8852e3c3016821eae8da58f1b2b47f1ec3e0
-
Filesize
96KB
MD5db5290ba2009f80df7bcbb05a74c37aa
SHA1a676ade7ee963323b8185c8210285a5d6ed92fcd
SHA256cfd1e1ce7d183f76b3023549d6a004db54781fdd01666aa9e30c160ef8be380f
SHA5124f307c158b9fe3a8b77ff331a490e693721e8f7e0369ea74a749a1a56a01ed2a5b85a8d3678cfa51ae25a57450177216a933fe3f881d4f2b2662895a8d64514f