Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe
Resource
win7-20240708-en
General
-
Target
2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe
-
Size
96KB
-
MD5
413943c6ee13467286abb93e4f8959ff
-
SHA1
5e6200d33110cfb5f18b7ac232dfc05c5b09b61f
-
SHA256
2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d
-
SHA512
885e2779c74cd0b6ee8b4731d215301e8f174f9e0f29cdddb19ace8d580c1cfec4252f807b2278972ea0c54ee41ac86c920865d30a825d39499d72be8edd3210
-
SSDEEP
1536:wnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx5:wGs8cd8eXlYairZYqMddH135
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3212 omsecor.exe 2240 omsecor.exe 3852 omsecor.exe 4456 omsecor.exe 2996 omsecor.exe 4632 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3784 set thread context of 1404 3784 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 83 PID 3212 set thread context of 2240 3212 omsecor.exe 87 PID 3852 set thread context of 4456 3852 omsecor.exe 107 PID 2996 set thread context of 4632 2996 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 2296 3784 WerFault.exe 82 1064 3212 WerFault.exe 86 544 3852 WerFault.exe 106 4968 2996 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3784 wrote to memory of 1404 3784 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 83 PID 3784 wrote to memory of 1404 3784 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 83 PID 3784 wrote to memory of 1404 3784 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 83 PID 3784 wrote to memory of 1404 3784 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 83 PID 3784 wrote to memory of 1404 3784 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 83 PID 1404 wrote to memory of 3212 1404 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 86 PID 1404 wrote to memory of 3212 1404 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 86 PID 1404 wrote to memory of 3212 1404 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 86 PID 3212 wrote to memory of 2240 3212 omsecor.exe 87 PID 3212 wrote to memory of 2240 3212 omsecor.exe 87 PID 3212 wrote to memory of 2240 3212 omsecor.exe 87 PID 3212 wrote to memory of 2240 3212 omsecor.exe 87 PID 3212 wrote to memory of 2240 3212 omsecor.exe 87 PID 2240 wrote to memory of 3852 2240 omsecor.exe 106 PID 2240 wrote to memory of 3852 2240 omsecor.exe 106 PID 2240 wrote to memory of 3852 2240 omsecor.exe 106 PID 3852 wrote to memory of 4456 3852 omsecor.exe 107 PID 3852 wrote to memory of 4456 3852 omsecor.exe 107 PID 3852 wrote to memory of 4456 3852 omsecor.exe 107 PID 3852 wrote to memory of 4456 3852 omsecor.exe 107 PID 3852 wrote to memory of 4456 3852 omsecor.exe 107 PID 4456 wrote to memory of 2996 4456 omsecor.exe 109 PID 4456 wrote to memory of 2996 4456 omsecor.exe 109 PID 4456 wrote to memory of 2996 4456 omsecor.exe 109 PID 2996 wrote to memory of 4632 2996 omsecor.exe 111 PID 2996 wrote to memory of 4632 2996 omsecor.exe 111 PID 2996 wrote to memory of 4632 2996 omsecor.exe 111 PID 2996 wrote to memory of 4632 2996 omsecor.exe 111 PID 2996 wrote to memory of 4632 2996 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe"C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exeC:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 2688⤵
- Program crash
PID:4968
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 3046⤵
- Program crash
PID:544
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 3004⤵
- Program crash
PID:1064
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 2882⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3784 -ip 37841⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3212 -ip 32121⤵PID:1208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3852 -ip 38521⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2996 -ip 29961⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a75de2f488ea7096cacc1b1b5e98082b
SHA1956ae8c09523f7192fae8b0873a4d9ef2c400720
SHA256c3fba48917e6d679999a568a8ce6ab67234b006d0fe7a8b2d89d986eb078c5e4
SHA512a730bcb8ac2240350f57b0fb3affedebc9e283f8d954513a2ca2faaca2c24b50539ffcb89e62e0e8c2976b7b2f3b1032064f0d03739dfd7db701de9cb05157fa
-
Filesize
96KB
MD5884c6ba9da110dabdca212d37e1484f2
SHA100a8c7a9a954f4cd30d5de62a0fe987e9cd2b166
SHA256c02f66c916ebf10d40b98bef3f9c6ca67425397a1ccb9baee9cae4b66df369c7
SHA51267e4f10c62fda2b403dfba087b403619fcd3d7d7d3c6bbbafa593f47a6acb4425fdb6950da8e763833816e5bcd46a93d23be69c07c8a4085942d7f621efe8f10
-
Filesize
96KB
MD557947c1bbd45266c438d861c3601694c
SHA1c3fe42ae77f33960430b6844392b736a9d272c52
SHA256f3971ced4c84f8ed5474ebc08b74658e7ff54c559d978918fd4adee3fe676319
SHA512470a9359ea85e7747f08e29835250e7266a894c2d7269cd869dc5dddb7e73d5097f00180ebeef1f77167a182f36d78696e351bb0aafb6d0fd55021049bae871e