Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe
Resource
win7-20240903-en
General
-
Target
19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe
-
Size
96KB
-
MD5
5d8468556ee467b3e085e9d7b333ef4a
-
SHA1
49de9504ce0911aa2341d9bc38f55d6a4352e191
-
SHA256
19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e
-
SHA512
a5a71218bc75a4419e8ba6cacef7d812564e0fb4af0126158fc7f80a5f377f8cc570be88a04b0dc77ebd038badfe61fb736e11e4e854b82fc24ba3a7fe788852
-
SSDEEP
1536:gnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:gGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3476 omsecor.exe 3088 omsecor.exe 768 omsecor.exe 1684 omsecor.exe 972 omsecor.exe 632 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2324 set thread context of 1404 2324 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 82 PID 3476 set thread context of 3088 3476 omsecor.exe 86 PID 768 set thread context of 1684 768 omsecor.exe 100 PID 972 set thread context of 632 972 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2784 2324 WerFault.exe 81 2260 3476 WerFault.exe 85 4520 768 WerFault.exe 99 2600 972 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1404 2324 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 82 PID 2324 wrote to memory of 1404 2324 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 82 PID 2324 wrote to memory of 1404 2324 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 82 PID 2324 wrote to memory of 1404 2324 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 82 PID 2324 wrote to memory of 1404 2324 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 82 PID 1404 wrote to memory of 3476 1404 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 85 PID 1404 wrote to memory of 3476 1404 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 85 PID 1404 wrote to memory of 3476 1404 19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe 85 PID 3476 wrote to memory of 3088 3476 omsecor.exe 86 PID 3476 wrote to memory of 3088 3476 omsecor.exe 86 PID 3476 wrote to memory of 3088 3476 omsecor.exe 86 PID 3476 wrote to memory of 3088 3476 omsecor.exe 86 PID 3476 wrote to memory of 3088 3476 omsecor.exe 86 PID 3088 wrote to memory of 768 3088 omsecor.exe 99 PID 3088 wrote to memory of 768 3088 omsecor.exe 99 PID 3088 wrote to memory of 768 3088 omsecor.exe 99 PID 768 wrote to memory of 1684 768 omsecor.exe 100 PID 768 wrote to memory of 1684 768 omsecor.exe 100 PID 768 wrote to memory of 1684 768 omsecor.exe 100 PID 768 wrote to memory of 1684 768 omsecor.exe 100 PID 768 wrote to memory of 1684 768 omsecor.exe 100 PID 1684 wrote to memory of 972 1684 omsecor.exe 102 PID 1684 wrote to memory of 972 1684 omsecor.exe 102 PID 1684 wrote to memory of 972 1684 omsecor.exe 102 PID 972 wrote to memory of 632 972 omsecor.exe 104 PID 972 wrote to memory of 632 972 omsecor.exe 104 PID 972 wrote to memory of 632 972 omsecor.exe 104 PID 972 wrote to memory of 632 972 omsecor.exe 104 PID 972 wrote to memory of 632 972 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe"C:\Users\Admin\AppData\Local\Temp\19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exeC:\Users\Admin\AppData\Local\Temp\19dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 2568⤵
- Program crash
PID:2600
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 768 -s 2926⤵
- Program crash
PID:4520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3476 -s 2924⤵
- Program crash
PID:2260
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2722⤵
- Program crash
PID:2784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2324 -ip 23241⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3476 -ip 34761⤵PID:720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 768 -ip 7681⤵PID:688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 972 -ip 9721⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57a3391e98949db141f2ea59deb5a8ef0
SHA1d452575e50f39e096b0aa0eb169a983400ebe3b1
SHA2568f541940672137a7617c13275212554ec777633391afa0afeaa774c422a0b8fb
SHA5124f4dce985803678a3438b8067ffc67c3b4455fd1f857f2268056960909f3c2bb5970b6527108af25ba39fa58ea9b06975756a5db8e70445605b941f51858db08
-
Filesize
96KB
MD5db08c118128c51fcc1e47b23e03f127e
SHA1c5c8bb9551641a6d0fb36d449e62bc2a55da6bc7
SHA256fec3b464124940394d7b0f907b9f456eea6dc36afe28b82fdf31dba35eb8b7cc
SHA51254e254dc2c45d5c8c92fb60217035ab2b009d99d027e5fd9a7d90dbcdead13d11b33ea004ea667bf69ef18b49f91f42cb2e691bbe6bfb0fc990b406a74d4bf28
-
Filesize
96KB
MD53612cc603ce310fc0e917124c509d581
SHA1f7864ade949464b6dac3daa8da542c102fb27b65
SHA256140b0a5e6000727c6c558827c70b1201041c575ad42ad5d6645c254c656567aa
SHA512569ef170d2077c6d3f14808d456667f2c1f8e9098bf3a686b6f31868573e27f625d329d81f0e37c23f7e29b8bed7160c3c7a02e1a998e51b7a791c4b4286e21b