Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe
Resource
win7-20241010-en
General
-
Target
b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe
-
Size
96KB
-
MD5
c2cab31a81e910d235fa246b3986a3e0
-
SHA1
c6e907beb0b2720a16b5dedac994af35231b1964
-
SHA256
b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947
-
SHA512
b5dcac08a6e8cc050916b6fc01cbe6d8e681a8c9aec61df045064ee263780f412df348441d21282b2acb1dda465335d97b2a3191fcebbbfabae909b82e76d003
-
SSDEEP
1536:YnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:YGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 852 omsecor.exe 1596 omsecor.exe 1116 omsecor.exe 4624 omsecor.exe 856 omsecor.exe 1972 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2112 set thread context of 4900 2112 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 83 PID 852 set thread context of 1596 852 omsecor.exe 88 PID 1116 set thread context of 4624 1116 omsecor.exe 109 PID 856 set thread context of 1972 856 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 1488 2112 WerFault.exe 82 4068 852 WerFault.exe 86 4704 1116 WerFault.exe 108 4536 856 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4900 2112 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 83 PID 2112 wrote to memory of 4900 2112 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 83 PID 2112 wrote to memory of 4900 2112 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 83 PID 2112 wrote to memory of 4900 2112 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 83 PID 2112 wrote to memory of 4900 2112 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 83 PID 4900 wrote to memory of 852 4900 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 86 PID 4900 wrote to memory of 852 4900 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 86 PID 4900 wrote to memory of 852 4900 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 86 PID 852 wrote to memory of 1596 852 omsecor.exe 88 PID 852 wrote to memory of 1596 852 omsecor.exe 88 PID 852 wrote to memory of 1596 852 omsecor.exe 88 PID 852 wrote to memory of 1596 852 omsecor.exe 88 PID 852 wrote to memory of 1596 852 omsecor.exe 88 PID 1596 wrote to memory of 1116 1596 omsecor.exe 108 PID 1596 wrote to memory of 1116 1596 omsecor.exe 108 PID 1596 wrote to memory of 1116 1596 omsecor.exe 108 PID 1116 wrote to memory of 4624 1116 omsecor.exe 109 PID 1116 wrote to memory of 4624 1116 omsecor.exe 109 PID 1116 wrote to memory of 4624 1116 omsecor.exe 109 PID 1116 wrote to memory of 4624 1116 omsecor.exe 109 PID 1116 wrote to memory of 4624 1116 omsecor.exe 109 PID 4624 wrote to memory of 856 4624 omsecor.exe 111 PID 4624 wrote to memory of 856 4624 omsecor.exe 111 PID 4624 wrote to memory of 856 4624 omsecor.exe 111 PID 856 wrote to memory of 1972 856 omsecor.exe 112 PID 856 wrote to memory of 1972 856 omsecor.exe 112 PID 856 wrote to memory of 1972 856 omsecor.exe 112 PID 856 wrote to memory of 1972 856 omsecor.exe 112 PID 856 wrote to memory of 1972 856 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe"C:\Users\Admin\AppData\Local\Temp\b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exeC:\Users\Admin\AppData\Local\Temp\b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 2448⤵
- Program crash
PID:4536
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 2926⤵
- Program crash
PID:4704
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 3004⤵
- Program crash
PID:4068
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 2882⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2112 -ip 21121⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 852 -ip 8521⤵PID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1116 -ip 11161⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 856 -ip 8561⤵PID:2000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD538fd507f2f0e1f992df19494b466d02f
SHA1386b7f5f3343daa78a09206f251548770d512add
SHA2563cf1d47c53353f2707a5ffe0173d31025f4155aca5bf3a213e147ca49c175b8b
SHA51279298a0824895149945220c1032e36e3a84a39d74cc6b1dbd5dd6da89c515746686a38cb2d1d8a6c54575b3ab26d30f6a005bc0f9d6b322423515dc7ed552d97
-
Filesize
96KB
MD5a5ec1629a2b5c30da08a66ffba114faa
SHA197a4c63136cefd313fd22996d2d2f63dff2a0fa7
SHA256e80feb929568a89ab32450d4d87923d0b148af29f5608ff82251b024073fd57e
SHA5124e314d2f83d9e101a51e3b25ba7c2ebab7dbb92a8a9f92bf46b9ca2c749b7bbf9b1a3720f66cfad527b7e8f4b865e624227ed1716fab9ab8702d04463c881eb1
-
Filesize
96KB
MD57ed98de7c37d6735bed34420715f4105
SHA193be2dad407868db5444f786db83a4c2115eec73
SHA256e7360b9a6ebe9daa54f05e30a01cb097b68a4e0ba19b1990500045017f518d22
SHA512cdc01988ed3bc45c43b8fdbc65c945f65544b1c2c58bc1b0c5d9dbb919887185b85f38151d935099ab0ea67652b46c9f1bde25e44cfccfb2d9a30a913745ee86