Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe
Resource
win7-20240903-en
General
-
Target
5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe
-
Size
96KB
-
MD5
73c8725f4cc2e9353e25fc29ba382050
-
SHA1
38a31f74e6df578a4fbce4169bec50937fb85708
-
SHA256
5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5
-
SHA512
bd23f2b3995b41c450a3ba1a8b9d610bd37894afbe1e160086a93dbe213a903233523bcadc4b779eadb8aa042a2d000ad7ee241eac586e03021b214c5c96991c
-
SSDEEP
1536:6nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:6Gs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1420 omsecor.exe 4076 omsecor.exe 2056 omsecor.exe 1300 omsecor.exe 2916 omsecor.exe 740 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1668 set thread context of 1576 1668 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 82 PID 1420 set thread context of 4076 1420 omsecor.exe 87 PID 2056 set thread context of 1300 2056 omsecor.exe 100 PID 2916 set thread context of 740 2916 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 440 1668 WerFault.exe 81 1376 1420 WerFault.exe 85 4420 2056 WerFault.exe 99 4628 2916 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1576 1668 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 82 PID 1668 wrote to memory of 1576 1668 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 82 PID 1668 wrote to memory of 1576 1668 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 82 PID 1668 wrote to memory of 1576 1668 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 82 PID 1668 wrote to memory of 1576 1668 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 82 PID 1576 wrote to memory of 1420 1576 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 85 PID 1576 wrote to memory of 1420 1576 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 85 PID 1576 wrote to memory of 1420 1576 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 85 PID 1420 wrote to memory of 4076 1420 omsecor.exe 87 PID 1420 wrote to memory of 4076 1420 omsecor.exe 87 PID 1420 wrote to memory of 4076 1420 omsecor.exe 87 PID 1420 wrote to memory of 4076 1420 omsecor.exe 87 PID 1420 wrote to memory of 4076 1420 omsecor.exe 87 PID 4076 wrote to memory of 2056 4076 omsecor.exe 99 PID 4076 wrote to memory of 2056 4076 omsecor.exe 99 PID 4076 wrote to memory of 2056 4076 omsecor.exe 99 PID 2056 wrote to memory of 1300 2056 omsecor.exe 100 PID 2056 wrote to memory of 1300 2056 omsecor.exe 100 PID 2056 wrote to memory of 1300 2056 omsecor.exe 100 PID 2056 wrote to memory of 1300 2056 omsecor.exe 100 PID 2056 wrote to memory of 1300 2056 omsecor.exe 100 PID 1300 wrote to memory of 2916 1300 omsecor.exe 102 PID 1300 wrote to memory of 2916 1300 omsecor.exe 102 PID 1300 wrote to memory of 2916 1300 omsecor.exe 102 PID 2916 wrote to memory of 740 2916 omsecor.exe 104 PID 2916 wrote to memory of 740 2916 omsecor.exe 104 PID 2916 wrote to memory of 740 2916 omsecor.exe 104 PID 2916 wrote to memory of 740 2916 omsecor.exe 104 PID 2916 wrote to memory of 740 2916 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe"C:\Users\Admin\AppData\Local\Temp\5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exeC:\Users\Admin\AppData\Local\Temp\5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 2688⤵
- Program crash
PID:4628
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 2926⤵
- Program crash
PID:4420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 2924⤵
- Program crash
PID:1376
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 2882⤵
- Program crash
PID:440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1668 -ip 16681⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1420 -ip 14201⤵PID:4020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2056 -ip 20561⤵PID:4952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2916 -ip 29161⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD514e9631fb3c79e87f9a6a7e6b091170f
SHA12f8946e030270502ac38c7a05285a0663860edea
SHA256c487e3e4fcd29fc67cd2605ae63411ca262b34f26ac72e65daacb4c3ae93c839
SHA512936378b3347cde2f031ac3284c1646ba8b4ce6ec21829da66c003be17123165bde09a9072e81382f43a4d0ba2f9a839d4a966c60c374da19e0497c7230b1d897
-
Filesize
96KB
MD5374166ba8e6fe275f16aa4fb6216ddc9
SHA1cc1dda12e6f091bc20e379a6605ba9b5385df3e5
SHA256547f6a492f7b169571cccc74eb67472d1a880b3097f57418664021b2abaf1e40
SHA5120d470d82b93e63dc2985df2726b500b6ca7e1a55b4d290118bb14cbe1b67a6ac9afd3b298d0847ecabb2bc17ec6399b4b548d66b26aee6714b1d0d21bd4f3236
-
Filesize
96KB
MD59fe476e05f8984d112d33e0564bdf29e
SHA1042afbac62744cc9d4c5baa16672f5d62db5f149
SHA2564311b80149535661761ecd66648865ab2431fd769bfb5389774c3844d3a7d565
SHA512ac283d0a140d9ab9b05c0fe9cd15a032f82d18bb7884315e6e361f0aaecd3345cc651b1be1b939aace064afea59ec04336a9eddaba59216d6644b1fc1ae28f85