Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe
Resource
win7-20240903-en
General
-
Target
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe
-
Size
96KB
-
MD5
0b32125002b67d709d253016765b787f
-
SHA1
d2d8b89781791d34def210ea29486033cff64e1c
-
SHA256
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228
-
SHA512
eee8a9eb9a179c9e4204720770ec561309023b5eeeea93c104577fa078e423e248876cfba33b7ad99c27554f1ca1376c902fe56e62a6793414bdda6399a3daa0
-
SSDEEP
1536:ZnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:ZGs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid Process 4944 omsecor.exe 4140 omsecor.exe 4040 omsecor.exe 2068 omsecor.exe 3560 omsecor.exe 4088 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 116 set thread context of 2208 116 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 4944 set thread context of 4140 4944 omsecor.exe 87 PID 4040 set thread context of 2068 4040 omsecor.exe 110 PID 3560 set thread context of 4088 3560 omsecor.exe 114 -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 3216 116 WerFault.exe 82 468 4944 WerFault.exe 85 2112 4040 WerFault.exe 109 5080 3560 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
omsecor.exeomsecor.exeomsecor.exe79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 116 wrote to memory of 2208 116 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 116 wrote to memory of 2208 116 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 116 wrote to memory of 2208 116 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 116 wrote to memory of 2208 116 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 116 wrote to memory of 2208 116 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 2208 wrote to memory of 4944 2208 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 85 PID 2208 wrote to memory of 4944 2208 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 85 PID 2208 wrote to memory of 4944 2208 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 85 PID 4944 wrote to memory of 4140 4944 omsecor.exe 87 PID 4944 wrote to memory of 4140 4944 omsecor.exe 87 PID 4944 wrote to memory of 4140 4944 omsecor.exe 87 PID 4944 wrote to memory of 4140 4944 omsecor.exe 87 PID 4944 wrote to memory of 4140 4944 omsecor.exe 87 PID 4140 wrote to memory of 4040 4140 omsecor.exe 109 PID 4140 wrote to memory of 4040 4140 omsecor.exe 109 PID 4140 wrote to memory of 4040 4140 omsecor.exe 109 PID 4040 wrote to memory of 2068 4040 omsecor.exe 110 PID 4040 wrote to memory of 2068 4040 omsecor.exe 110 PID 4040 wrote to memory of 2068 4040 omsecor.exe 110 PID 4040 wrote to memory of 2068 4040 omsecor.exe 110 PID 4040 wrote to memory of 2068 4040 omsecor.exe 110 PID 2068 wrote to memory of 3560 2068 omsecor.exe 112 PID 2068 wrote to memory of 3560 2068 omsecor.exe 112 PID 2068 wrote to memory of 3560 2068 omsecor.exe 112 PID 3560 wrote to memory of 4088 3560 omsecor.exe 114 PID 3560 wrote to memory of 4088 3560 omsecor.exe 114 PID 3560 wrote to memory of 4088 3560 omsecor.exe 114 PID 3560 wrote to memory of 4088 3560 omsecor.exe 114 PID 3560 wrote to memory of 4088 3560 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe"C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeC:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 2528⤵
- Program crash
PID:5080
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 2966⤵
- Program crash
PID:2112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 2884⤵
- Program crash
PID:468
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 2882⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 116 -ip 1161⤵PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4944 -ip 49441⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4040 -ip 40401⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3560 -ip 35601⤵PID:4120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d89d2a70f36f2b58ba98917ba2b1560f
SHA1b00aa4b25958b3ae5bed2af6130da41b144a7434
SHA256f46591382c32a3692507eb7b76937d10541f0c01a61cfc68d437dab34ed2f05b
SHA5123fd919b4ef40fc63807a73a1f1bfca8dcfef5b7ba110d54f703ac1a02892b2017ee3dc3db0aad488e80e51781d189477e29ca02b1a785da4c4c93ea6eb69038c
-
Filesize
96KB
MD526955fa3c0d28ca27e5b5b057c20236a
SHA16707227db0ec5305cc6f064223389da9a20abdde
SHA2568e18a9536229dcefe105c46f87848a0716dc4291e5b8a1ea48c53e7b02ebc1a7
SHA512660686dd51df969784f95e76ab3140ff4c23c5e446553cda85390b468f46a6985afb8822d54e8e0938e918fd0ea4ca213033d96ebc17b3e95b3b6269410f83d0
-
Filesize
96KB
MD5afd39456c9d0d4cb3adee212248f0290
SHA14bb4bcfad10f4e4b7ea814d2cca3d17e62b2fbff
SHA256634e53bb87815cde137805ceecf8aa17962de50ecc2861b2496955f7957e52d1
SHA5121ff4740c0bd5c67ca2952caf8ba36fb0cd18de9fa0e15421163b7b1d72e2d10ea0b476fa0cf31cd7da21341c4e92f232912ef22416c6115d7d84d9901a6bf9b4