Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe
Resource
win7-20240903-en
General
-
Target
794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe
-
Size
96KB
-
MD5
0249e3dd89f68358a93601b139fab1ce
-
SHA1
cd2de26853cbb87cad8f4d72233e9e86af263d13
-
SHA256
794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89
-
SHA512
8f2bae5839a88239a82e879c1319a5d6abf3bbb4222c7d6e05fb64a138c5236ced543c2d484109213571ace023acf7a781679c0ce70f111f40cd791dd1a11833
-
SSDEEP
1536:YnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:YGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2140 omsecor.exe 1068 omsecor.exe 344 omsecor.exe 552 omsecor.exe 1932 omsecor.exe 1684 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2284 set thread context of 4868 2284 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 83 PID 2140 set thread context of 1068 2140 omsecor.exe 88 PID 344 set thread context of 552 344 omsecor.exe 108 PID 1932 set thread context of 1684 1932 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 1012 2284 WerFault.exe 82 2212 2140 WerFault.exe 86 4204 344 WerFault.exe 107 3784 1932 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4868 2284 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 83 PID 2284 wrote to memory of 4868 2284 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 83 PID 2284 wrote to memory of 4868 2284 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 83 PID 2284 wrote to memory of 4868 2284 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 83 PID 2284 wrote to memory of 4868 2284 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 83 PID 4868 wrote to memory of 2140 4868 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 86 PID 4868 wrote to memory of 2140 4868 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 86 PID 4868 wrote to memory of 2140 4868 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 86 PID 2140 wrote to memory of 1068 2140 omsecor.exe 88 PID 2140 wrote to memory of 1068 2140 omsecor.exe 88 PID 2140 wrote to memory of 1068 2140 omsecor.exe 88 PID 2140 wrote to memory of 1068 2140 omsecor.exe 88 PID 2140 wrote to memory of 1068 2140 omsecor.exe 88 PID 1068 wrote to memory of 344 1068 omsecor.exe 107 PID 1068 wrote to memory of 344 1068 omsecor.exe 107 PID 1068 wrote to memory of 344 1068 omsecor.exe 107 PID 344 wrote to memory of 552 344 omsecor.exe 108 PID 344 wrote to memory of 552 344 omsecor.exe 108 PID 344 wrote to memory of 552 344 omsecor.exe 108 PID 344 wrote to memory of 552 344 omsecor.exe 108 PID 344 wrote to memory of 552 344 omsecor.exe 108 PID 552 wrote to memory of 1932 552 omsecor.exe 110 PID 552 wrote to memory of 1932 552 omsecor.exe 110 PID 552 wrote to memory of 1932 552 omsecor.exe 110 PID 1932 wrote to memory of 1684 1932 omsecor.exe 112 PID 1932 wrote to memory of 1684 1932 omsecor.exe 112 PID 1932 wrote to memory of 1684 1932 omsecor.exe 112 PID 1932 wrote to memory of 1684 1932 omsecor.exe 112 PID 1932 wrote to memory of 1684 1932 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe"C:\Users\Admin\AppData\Local\Temp\794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exeC:\Users\Admin\AppData\Local\Temp\794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 2568⤵
- Program crash
PID:3784
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 2966⤵
- Program crash
PID:4204
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2140 -s 2724⤵
- Program crash
PID:2212
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 2882⤵
- Program crash
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2284 -ip 22841⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2140 -ip 21401⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 344 -ip 3441⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1932 -ip 19321⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5252813f5a29f2b12147169540854258a
SHA12916977b72b4068514c87979056df8e96db4c933
SHA256db97d5b4817d4d0fcb11e22228e4c31fbb94b79783525161568a408ffaa3ff85
SHA51261f8b1e5158a8fd1c5b623f3fc9b016c5ba4546341026b201bd334f5c2e378ec96a6e81ce3c8d651aa1e4f494ac6a0c3b699cce8025b4eb214694955e7e86458
-
Filesize
96KB
MD5c87554b4d16b4d9c6b7e9cc99a82290d
SHA116d875aba79925654781c57c77c439a31b3962d0
SHA256fb0af20192bd74ce698078ec23ef8c0ea98b72c569ca7d23f4604ded45b3c6ad
SHA512c66900a276537958cd5d1c8becd098be0b350538271e89a02815b8722bd6694ae3610ae7e322e399cdefec2f9d5a05a8bbe9906c06cffcce1a3f93efa30accb7
-
Filesize
96KB
MD5071f596358039ca96780bd77fb7c84ff
SHA15173ff1ce6e1e06cb5da1b37abe09de4b26ad074
SHA256e0534b2305490db8f448a6b07fd29f12137660dba1a9d952b7d44b2acb3e0ce6
SHA5128cfa969e7df108020afd1a8c132253910b94993e59704357f7f365772bf4b939c5f1f4d2e7e87cb303c594fa32d8e640530fea68cc16887c8c09c0e9c47cc590