Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe
Resource
win7-20240903-en
General
-
Target
22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe
-
Size
96KB
-
MD5
e7668caa2e090dfeac6d3372f9da33f3
-
SHA1
4053cca1aebef18c1db64687a1a5cf1cff4d1172
-
SHA256
22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22
-
SHA512
865d484c1bcdd7cf921916322b6c076132fab26eabe2cc8240f9f15d28b1dce444a00e8aaefef7d3c1a34aa1e7de3afce34af6f83b5f41805382051f348b4fa3
-
SSDEEP
1536:dnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:dGs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2852 omsecor.exe 1908 omsecor.exe 3012 omsecor.exe 2704 omsecor.exe 3444 omsecor.exe 2016 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3420 set thread context of 3476 3420 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 82 PID 2852 set thread context of 1908 2852 omsecor.exe 87 PID 3012 set thread context of 2704 3012 omsecor.exe 100 PID 3444 set thread context of 2016 3444 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3696 3420 WerFault.exe 81 4020 2852 WerFault.exe 84 3680 3012 WerFault.exe 99 4148 3444 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3420 wrote to memory of 3476 3420 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 82 PID 3420 wrote to memory of 3476 3420 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 82 PID 3420 wrote to memory of 3476 3420 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 82 PID 3420 wrote to memory of 3476 3420 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 82 PID 3420 wrote to memory of 3476 3420 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 82 PID 3476 wrote to memory of 2852 3476 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 84 PID 3476 wrote to memory of 2852 3476 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 84 PID 3476 wrote to memory of 2852 3476 22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe 84 PID 2852 wrote to memory of 1908 2852 omsecor.exe 87 PID 2852 wrote to memory of 1908 2852 omsecor.exe 87 PID 2852 wrote to memory of 1908 2852 omsecor.exe 87 PID 2852 wrote to memory of 1908 2852 omsecor.exe 87 PID 2852 wrote to memory of 1908 2852 omsecor.exe 87 PID 1908 wrote to memory of 3012 1908 omsecor.exe 99 PID 1908 wrote to memory of 3012 1908 omsecor.exe 99 PID 1908 wrote to memory of 3012 1908 omsecor.exe 99 PID 3012 wrote to memory of 2704 3012 omsecor.exe 100 PID 3012 wrote to memory of 2704 3012 omsecor.exe 100 PID 3012 wrote to memory of 2704 3012 omsecor.exe 100 PID 3012 wrote to memory of 2704 3012 omsecor.exe 100 PID 3012 wrote to memory of 2704 3012 omsecor.exe 100 PID 2704 wrote to memory of 3444 2704 omsecor.exe 102 PID 2704 wrote to memory of 3444 2704 omsecor.exe 102 PID 2704 wrote to memory of 3444 2704 omsecor.exe 102 PID 3444 wrote to memory of 2016 3444 omsecor.exe 104 PID 3444 wrote to memory of 2016 3444 omsecor.exe 104 PID 3444 wrote to memory of 2016 3444 omsecor.exe 104 PID 3444 wrote to memory of 2016 3444 omsecor.exe 104 PID 3444 wrote to memory of 2016 3444 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe"C:\Users\Admin\AppData\Local\Temp\22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exeC:\Users\Admin\AppData\Local\Temp\22b87a34441e4c160435154bad2213ddabb354855263d85648149e1818270f22.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2688⤵
- Program crash
PID:4148
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 2926⤵
- Program crash
PID:3680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 2884⤵
- Program crash
PID:4020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 3002⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3420 -ip 34201⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2852 -ip 28521⤵PID:1896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3012 -ip 30121⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3444 -ip 34441⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD589167c64bf48be17aa84386bacde8cce
SHA1232dd8309732a0614b5e82b0fd5669f1a4e14ab9
SHA256e988791793c38a9836d2fcf0c6ed4382be5ef46667e368b65d1493d6650e59cb
SHA512d9f6011c8434675ebbaa37c1949927555e8109d99363fdb994171016b7dcdb91e162f06f4506ac15c8dd2b1855588958c5d8a3789451dd53e63cd8fd8f408196
-
Filesize
96KB
MD5d781a428a8527d02c8c64178c2b9c4dd
SHA10b1342c76d3ccdfb2654aae8d873eedf0f8094b3
SHA2560bed39155326d0e33f1f1ecba24d5637a3131fd7d3bb5fc9ff999bd888caeeeb
SHA5120819f8692bb4b086318e17a2ae68e56ba41bb0639dbec3ae58cc0356a4339546cbc1260bbb5a2644f186faee4422495fc6b1a905bfa84cd22d820a9c51fb6f78
-
Filesize
96KB
MD53e2b4bdd23fcf696ab84a1ae60975ea6
SHA1d0d1d426b1b64a30cd183f058857450932e6dc2c
SHA256a0369584c30e0765daa934530795b2bb42345522fe9bb53443e15161f0abffe1
SHA5126251e14998a9bc89a702901f6f07c6e71a8dd53f4645e22c28b60f78bc82c6ae5fe977fcfa15670e32cdc511f4ed465c7024009751b88d1d7870dedc6128a7f4