Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe
Resource
win7-20241010-en
General
-
Target
ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe
-
Size
96KB
-
MD5
04563d75fcecf3eae1cc9006ac989ae0
-
SHA1
530f41c66f2c034780188d32d1caccfaa73613e3
-
SHA256
ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424
-
SHA512
156d89ff1ac103cc7294223d4dc23a44ac2c192990c36be7de47e75304376078903f7cd569d2f1d95af184a82a1e287258ce8133b78c9b193bfd0d8506635cbc
-
SSDEEP
1536:QnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:QGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4688 omsecor.exe 3608 omsecor.exe 1012 omsecor.exe 4068 omsecor.exe 2272 omsecor.exe 964 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1496 set thread context of 1808 1496 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 83 PID 4688 set thread context of 3608 4688 omsecor.exe 87 PID 1012 set thread context of 4068 1012 omsecor.exe 109 PID 2272 set thread context of 964 2272 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3448 1496 WerFault.exe 82 1952 4688 WerFault.exe 85 2800 1012 WerFault.exe 108 2680 2272 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1496 wrote to memory of 1808 1496 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 83 PID 1496 wrote to memory of 1808 1496 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 83 PID 1496 wrote to memory of 1808 1496 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 83 PID 1496 wrote to memory of 1808 1496 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 83 PID 1496 wrote to memory of 1808 1496 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 83 PID 1808 wrote to memory of 4688 1808 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 85 PID 1808 wrote to memory of 4688 1808 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 85 PID 1808 wrote to memory of 4688 1808 ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe 85 PID 4688 wrote to memory of 3608 4688 omsecor.exe 87 PID 4688 wrote to memory of 3608 4688 omsecor.exe 87 PID 4688 wrote to memory of 3608 4688 omsecor.exe 87 PID 4688 wrote to memory of 3608 4688 omsecor.exe 87 PID 4688 wrote to memory of 3608 4688 omsecor.exe 87 PID 3608 wrote to memory of 1012 3608 omsecor.exe 108 PID 3608 wrote to memory of 1012 3608 omsecor.exe 108 PID 3608 wrote to memory of 1012 3608 omsecor.exe 108 PID 1012 wrote to memory of 4068 1012 omsecor.exe 109 PID 1012 wrote to memory of 4068 1012 omsecor.exe 109 PID 1012 wrote to memory of 4068 1012 omsecor.exe 109 PID 1012 wrote to memory of 4068 1012 omsecor.exe 109 PID 1012 wrote to memory of 4068 1012 omsecor.exe 109 PID 4068 wrote to memory of 2272 4068 omsecor.exe 111 PID 4068 wrote to memory of 2272 4068 omsecor.exe 111 PID 4068 wrote to memory of 2272 4068 omsecor.exe 111 PID 2272 wrote to memory of 964 2272 omsecor.exe 113 PID 2272 wrote to memory of 964 2272 omsecor.exe 113 PID 2272 wrote to memory of 964 2272 omsecor.exe 113 PID 2272 wrote to memory of 964 2272 omsecor.exe 113 PID 2272 wrote to memory of 964 2272 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe"C:\Users\Admin\AppData\Local\Temp\ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exeC:\Users\Admin\AppData\Local\Temp\ef876d4528e399a528fdbf22eeeb581e49d65a113bb945b15cea48da574fd424N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 2568⤵
- Program crash
PID:2680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 3046⤵
- Program crash
PID:2800
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 2924⤵
- Program crash
PID:1952
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 2882⤵
- Program crash
PID:3448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1496 -ip 14961⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4688 -ip 46881⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1012 -ip 10121⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2272 -ip 22721⤵PID:3508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD533b53d4e4b62633decc8ecf6c7e5e270
SHA144aefb7c3029ab36cb62b8a7852550d555a8bca8
SHA2567b27b119a2033c799570df2e789a51a6e1bf562dfa9d786ddadef01450cf7752
SHA51286b6bb6fc3dc8848164f60b21c16b3f372ad8b3f37ca8a0a9cbc511292ac56608bc4a5e97e885138c717598aed85794e8d9049314720625997e117d861cd23d4
-
Filesize
96KB
MD55d8468556ee467b3e085e9d7b333ef4a
SHA149de9504ce0911aa2341d9bc38f55d6a4352e191
SHA25619dbe6824febf0a09bae240ec0a143903297ba7157ef31af3d3d713266f0f66e
SHA512a5a71218bc75a4419e8ba6cacef7d812564e0fb4af0126158fc7f80a5f377f8cc570be88a04b0dc77ebd038badfe61fb736e11e4e854b82fc24ba3a7fe788852
-
Filesize
96KB
MD5abe4b8db385a47ba4b0d3b1456d03596
SHA140e8e7091ad4d24ec76fca2af51e73a7058c8643
SHA2569267cd03205e1b87bb5817f8dc7aa16bbdeffc5567796991219048476e1a5c3d
SHA512886ae6c073f4343d0697ee9275381ffe07b5f6ad37174e4ea21fc9e38895da1432dab67e48d3959180d5bfe6c0d5bceca6bf2e7b7eba40160508cb096df66823