Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe
Resource
win7-20241010-en
General
-
Target
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe
-
Size
96KB
-
MD5
389707e51deb56cbc4a8fb521353819d
-
SHA1
16171e9390aaa1d836978f278134b4cf85719e00
-
SHA256
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add
-
SHA512
d9a2c9ad36169a682b936a54dde29188e7b39b50790aa9d2184cc6853d2ba5bb9c633c8403359b648f853ab3a5bcc88087e11c0120dfce4703628db1b7c158e3
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:TGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4604 omsecor.exe 5068 omsecor.exe 3580 omsecor.exe 2100 omsecor.exe 1280 omsecor.exe 3340 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4624 set thread context of 2092 4624 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 84 PID 4604 set thread context of 5068 4604 omsecor.exe 88 PID 3580 set thread context of 2100 3580 omsecor.exe 102 PID 1280 set thread context of 3340 1280 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 1780 4624 WerFault.exe 83 1224 4604 WerFault.exe 86 4888 3580 WerFault.exe 101 3420 1280 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4624 wrote to memory of 2092 4624 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 84 PID 4624 wrote to memory of 2092 4624 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 84 PID 4624 wrote to memory of 2092 4624 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 84 PID 4624 wrote to memory of 2092 4624 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 84 PID 4624 wrote to memory of 2092 4624 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 84 PID 2092 wrote to memory of 4604 2092 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 86 PID 2092 wrote to memory of 4604 2092 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 86 PID 2092 wrote to memory of 4604 2092 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 86 PID 4604 wrote to memory of 5068 4604 omsecor.exe 88 PID 4604 wrote to memory of 5068 4604 omsecor.exe 88 PID 4604 wrote to memory of 5068 4604 omsecor.exe 88 PID 4604 wrote to memory of 5068 4604 omsecor.exe 88 PID 4604 wrote to memory of 5068 4604 omsecor.exe 88 PID 5068 wrote to memory of 3580 5068 omsecor.exe 101 PID 5068 wrote to memory of 3580 5068 omsecor.exe 101 PID 5068 wrote to memory of 3580 5068 omsecor.exe 101 PID 3580 wrote to memory of 2100 3580 omsecor.exe 102 PID 3580 wrote to memory of 2100 3580 omsecor.exe 102 PID 3580 wrote to memory of 2100 3580 omsecor.exe 102 PID 3580 wrote to memory of 2100 3580 omsecor.exe 102 PID 3580 wrote to memory of 2100 3580 omsecor.exe 102 PID 2100 wrote to memory of 1280 2100 omsecor.exe 104 PID 2100 wrote to memory of 1280 2100 omsecor.exe 104 PID 2100 wrote to memory of 1280 2100 omsecor.exe 104 PID 1280 wrote to memory of 3340 1280 omsecor.exe 106 PID 1280 wrote to memory of 3340 1280 omsecor.exe 106 PID 1280 wrote to memory of 3340 1280 omsecor.exe 106 PID 1280 wrote to memory of 3340 1280 omsecor.exe 106 PID 1280 wrote to memory of 3340 1280 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe"C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exeC:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 2688⤵
- Program crash
PID:3420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 2966⤵
- Program crash
PID:4888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 2884⤵
- Program crash
PID:1224
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 2722⤵
- Program crash
PID:1780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4624 -ip 46241⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4604 -ip 46041⤵PID:2604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3580 -ip 35801⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1280 -ip 12801⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55f379d54c8fec3f2076e5ee555e64d09
SHA17de44d8ef0a29a281ada5219d10b665eb45f5375
SHA256f29389caf2ee469d5c720f5db19dcfe89d6bed4627062e525c285f7ce0292ebd
SHA5121d8afd76beba4fc426cb9aa524aeb3a9d8ef303774f69ad217146e1603a345942f64a3ac457d2ed77e4d1365d41c98f9e3e15daabe9a33087ccc4171cdab1e4e
-
Filesize
96KB
MD560b103e8243cb9402ec45cb635a0a193
SHA162ae2d50fe8fc00c0b051134423824db8e9016eb
SHA256f82cef83f9401b8ae787c0d61f16dd8dcff8eb56de73f0f4109ddff3280edd9d
SHA512adc4c8241f8ec0c62a71da3fdd1236d52fc223d27fe18f0f9e898ab65e10b7b9570b3c1543e4e0d5c8147752bcdcf444eaf385e6d35c95a48eaf67fa6929e0bb
-
Filesize
96KB
MD53c61ed1b1a08266b49a9131ce8d38d1a
SHA106d8c9c25ffc4b073a88eb5bf5cae10f9fed894a
SHA25602b6294964af27024bddf90aef92f2abd934bc8708cba446dc78044c8c69fb75
SHA512383b4f1d25dbb1ac40892a2f37c7df0ff0ed7000426528ccab5c968e83ce4bb9b17c7b8e1aea8cc8f578f7deaeb23b46f93098120b5cb0d01eba5fa1e78bc071