Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe
Resource
win7-20241010-en
General
-
Target
2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe
-
Size
96KB
-
MD5
aadaeb52e55be32cc0d7a72b08e5f9a0
-
SHA1
664ddf69e254972d8c08b050eff65342c470b346
-
SHA256
2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74
-
SHA512
25f5d99ca6e77f6d6712f90b6922238673cf4a62f0917057691a0021cec356becf2a302542f50a768ea4e61a652d0c94ebf3dff6c77580d69d8c4bae49a59fbb
-
SSDEEP
1536:0nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:0Gs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2176 omsecor.exe 4388 omsecor.exe 1184 omsecor.exe 312 omsecor.exe 2064 omsecor.exe 1200 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2944 set thread context of 3064 2944 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 83 PID 2176 set thread context of 4388 2176 omsecor.exe 88 PID 1184 set thread context of 312 1184 omsecor.exe 104 PID 2064 set thread context of 1200 2064 omsecor.exe 108 -
Program crash 4 IoCs
pid pid_target Process procid_target 4708 2944 WerFault.exe 82 3384 2176 WerFault.exe 86 808 1184 WerFault.exe 103 3004 2064 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2944 wrote to memory of 3064 2944 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 83 PID 2944 wrote to memory of 3064 2944 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 83 PID 2944 wrote to memory of 3064 2944 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 83 PID 2944 wrote to memory of 3064 2944 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 83 PID 2944 wrote to memory of 3064 2944 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 83 PID 3064 wrote to memory of 2176 3064 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 86 PID 3064 wrote to memory of 2176 3064 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 86 PID 3064 wrote to memory of 2176 3064 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 86 PID 2176 wrote to memory of 4388 2176 omsecor.exe 88 PID 2176 wrote to memory of 4388 2176 omsecor.exe 88 PID 2176 wrote to memory of 4388 2176 omsecor.exe 88 PID 2176 wrote to memory of 4388 2176 omsecor.exe 88 PID 2176 wrote to memory of 4388 2176 omsecor.exe 88 PID 4388 wrote to memory of 1184 4388 omsecor.exe 103 PID 4388 wrote to memory of 1184 4388 omsecor.exe 103 PID 4388 wrote to memory of 1184 4388 omsecor.exe 103 PID 1184 wrote to memory of 312 1184 omsecor.exe 104 PID 1184 wrote to memory of 312 1184 omsecor.exe 104 PID 1184 wrote to memory of 312 1184 omsecor.exe 104 PID 1184 wrote to memory of 312 1184 omsecor.exe 104 PID 1184 wrote to memory of 312 1184 omsecor.exe 104 PID 312 wrote to memory of 2064 312 omsecor.exe 106 PID 312 wrote to memory of 2064 312 omsecor.exe 106 PID 312 wrote to memory of 2064 312 omsecor.exe 106 PID 2064 wrote to memory of 1200 2064 omsecor.exe 108 PID 2064 wrote to memory of 1200 2064 omsecor.exe 108 PID 2064 wrote to memory of 1200 2064 omsecor.exe 108 PID 2064 wrote to memory of 1200 2064 omsecor.exe 108 PID 2064 wrote to memory of 1200 2064 omsecor.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe"C:\Users\Admin\AppData\Local\Temp\2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exeC:\Users\Admin\AppData\Local\Temp\2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 2688⤵
- Program crash
PID:3004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 2926⤵
- Program crash
PID:808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2884⤵
- Program crash
PID:3384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 2882⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2944 -ip 29441⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2176 -ip 21761⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1184 -ip 11841⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2064 -ip 20641⤵PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ac38e61ef18d7989916047962537df79
SHA18ecd3782170a01525ce7a6f2e326aed8c437176f
SHA256499dbd50dcf07dc7650e5f801d25edad4d212bc203cc2d23d827da0faaa6cb7b
SHA512e74a0c3a4085d859734bd5a6be3da036fd29d16850d092478ddb3537b11f46342aeaed2dffdc618dc769f497340187fddeadf24ed9db585ed9a2ba7a8a8b6ef8
-
Filesize
96KB
MD526c2738c2dbedd1c812ca720c6997ff9
SHA12241751435a939d4252892847335a144defd71b2
SHA2564cd9026718afc5b60a89163e71cfeb2cf678a8abdd8d9e5dc9ee38343ae8828f
SHA512d801338707719c4dc03be226b160deaf1f766477fdcb3f72f3bb4ae4a113dc8570e84ba54dd89931810ff1d538ed49a4e48eb3d91c4a008895c62ad12b74db5f
-
Filesize
96KB
MD56031eaf00ce79af9cf774ffaaa7fe062
SHA10eb2d6da5fe9816f8ee30d07007f4444ac87ca34
SHA256db1469c0f1c088f0da006eff697e44a998e7144cfc5819a1fc67547cc05229c5
SHA512853a58d0b5eee8e18bdb5e912be2197a36b98aea4c66fcf00a05985c73c8a4586e3fd89893b0e2102e2ee7fe1ad28a8168baffb9212fa9b5703ad9605c6595d9