Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe
Resource
win7-20241010-en
General
-
Target
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe
-
Size
96KB
-
MD5
0b32125002b67d709d253016765b787f
-
SHA1
d2d8b89781791d34def210ea29486033cff64e1c
-
SHA256
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228
-
SHA512
eee8a9eb9a179c9e4204720770ec561309023b5eeeea93c104577fa078e423e248876cfba33b7ad99c27554f1ca1376c902fe56e62a6793414bdda6399a3daa0
-
SSDEEP
1536:ZnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:ZGs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid Process 2856 omsecor.exe 3708 omsecor.exe 2404 omsecor.exe 4064 omsecor.exe 4040 omsecor.exe 1588 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 1660 set thread context of 3640 1660 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 2856 set thread context of 3708 2856 omsecor.exe 88 PID 2404 set thread context of 4064 2404 omsecor.exe 101 PID 4040 set thread context of 1588 4040 omsecor.exe 105 -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 5008 1660 WerFault.exe 82 3988 2856 WerFault.exe 86 1968 2404 WerFault.exe 100 3132 4040 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exe79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 1660 wrote to memory of 3640 1660 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 1660 wrote to memory of 3640 1660 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 1660 wrote to memory of 3640 1660 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 1660 wrote to memory of 3640 1660 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 1660 wrote to memory of 3640 1660 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 83 PID 3640 wrote to memory of 2856 3640 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 86 PID 3640 wrote to memory of 2856 3640 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 86 PID 3640 wrote to memory of 2856 3640 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 86 PID 2856 wrote to memory of 3708 2856 omsecor.exe 88 PID 2856 wrote to memory of 3708 2856 omsecor.exe 88 PID 2856 wrote to memory of 3708 2856 omsecor.exe 88 PID 2856 wrote to memory of 3708 2856 omsecor.exe 88 PID 2856 wrote to memory of 3708 2856 omsecor.exe 88 PID 3708 wrote to memory of 2404 3708 omsecor.exe 100 PID 3708 wrote to memory of 2404 3708 omsecor.exe 100 PID 3708 wrote to memory of 2404 3708 omsecor.exe 100 PID 2404 wrote to memory of 4064 2404 omsecor.exe 101 PID 2404 wrote to memory of 4064 2404 omsecor.exe 101 PID 2404 wrote to memory of 4064 2404 omsecor.exe 101 PID 2404 wrote to memory of 4064 2404 omsecor.exe 101 PID 2404 wrote to memory of 4064 2404 omsecor.exe 101 PID 4064 wrote to memory of 4040 4064 omsecor.exe 103 PID 4064 wrote to memory of 4040 4064 omsecor.exe 103 PID 4064 wrote to memory of 4040 4064 omsecor.exe 103 PID 4040 wrote to memory of 1588 4040 omsecor.exe 105 PID 4040 wrote to memory of 1588 4040 omsecor.exe 105 PID 4040 wrote to memory of 1588 4040 omsecor.exe 105 PID 4040 wrote to memory of 1588 4040 omsecor.exe 105 PID 4040 wrote to memory of 1588 4040 omsecor.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe"C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeC:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 2528⤵
- Program crash
PID:3132
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2926⤵
- Program crash
PID:1968
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 2924⤵
- Program crash
PID:3988
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2882⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1660 -ip 16601⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2856 -ip 28561⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2404 -ip 24041⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4040 -ip 40401⤵PID:1552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5efe6fc36e09f7b365dc92046a4a23792
SHA14c3f5882f08c06b8e233d00872589fd77ae85ba8
SHA2564b60265cecd09df0af717238e1d7c449865b5f645b965aa166de626e6fedcf9a
SHA512660e98a81b31dac8d9aa29d14713ae7141ff7c0f1e5e18b0d77f379c527c1cdb21522839723297d9cea3855e949799032ac9b12faa5b8d79ffdb65a73ccd6af8
-
Filesize
96KB
MD526955fa3c0d28ca27e5b5b057c20236a
SHA16707227db0ec5305cc6f064223389da9a20abdde
SHA2568e18a9536229dcefe105c46f87848a0716dc4291e5b8a1ea48c53e7b02ebc1a7
SHA512660686dd51df969784f95e76ab3140ff4c23c5e446553cda85390b468f46a6985afb8822d54e8e0938e918fd0ea4ca213033d96ebc17b3e95b3b6269410f83d0
-
Filesize
96KB
MD57a4fb3e91fd076537338119b03a9303e
SHA111fb631839931b7827f93994a50ba1fae633c74e
SHA2566ed682f725d9b443baa633cb80642258ea2bf51bde6cf77a04f2235ce6a911b9
SHA512b92e769bb3ca954845e7c8b5f7069f9c261f9e976d892df904e5eec14b2882434247660a621cf2d0c9718da55e953467b51397c2b2f43aa9a637f77b2e614968