Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 08:40
Static task
static1
Behavioral task
behavioral1
Sample
f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe
Resource
win7-20241010-en
General
-
Target
f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe
-
Size
96KB
-
MD5
af6119db2aab92ae41d30664b84f3670
-
SHA1
61939f02faaa197504b9630be8d7e6e75c49654b
-
SHA256
f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357e
-
SHA512
12b86225feb6a4819cecf045e26d11952c998c270111ee8e8dfb2708ff8d779c91545fc98db60ff52fec86378b7bb9d54303a2f725fdb292f5b00746865c996d
-
SSDEEP
1536:bnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:bGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1988 omsecor.exe 1460 omsecor.exe 4312 omsecor.exe 5032 omsecor.exe 1272 omsecor.exe 1420 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4860 set thread context of 4916 4860 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 83 PID 1988 set thread context of 1460 1988 omsecor.exe 88 PID 4312 set thread context of 5032 4312 omsecor.exe 108 PID 1272 set thread context of 1420 1272 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 1264 4860 WerFault.exe 82 4496 1988 WerFault.exe 86 1204 4312 WerFault.exe 107 3232 1272 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4916 4860 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 83 PID 4860 wrote to memory of 4916 4860 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 83 PID 4860 wrote to memory of 4916 4860 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 83 PID 4860 wrote to memory of 4916 4860 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 83 PID 4860 wrote to memory of 4916 4860 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 83 PID 4916 wrote to memory of 1988 4916 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 86 PID 4916 wrote to memory of 1988 4916 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 86 PID 4916 wrote to memory of 1988 4916 f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe 86 PID 1988 wrote to memory of 1460 1988 omsecor.exe 88 PID 1988 wrote to memory of 1460 1988 omsecor.exe 88 PID 1988 wrote to memory of 1460 1988 omsecor.exe 88 PID 1988 wrote to memory of 1460 1988 omsecor.exe 88 PID 1988 wrote to memory of 1460 1988 omsecor.exe 88 PID 1460 wrote to memory of 4312 1460 omsecor.exe 107 PID 1460 wrote to memory of 4312 1460 omsecor.exe 107 PID 1460 wrote to memory of 4312 1460 omsecor.exe 107 PID 4312 wrote to memory of 5032 4312 omsecor.exe 108 PID 4312 wrote to memory of 5032 4312 omsecor.exe 108 PID 4312 wrote to memory of 5032 4312 omsecor.exe 108 PID 4312 wrote to memory of 5032 4312 omsecor.exe 108 PID 4312 wrote to memory of 5032 4312 omsecor.exe 108 PID 5032 wrote to memory of 1272 5032 omsecor.exe 110 PID 5032 wrote to memory of 1272 5032 omsecor.exe 110 PID 5032 wrote to memory of 1272 5032 omsecor.exe 110 PID 1272 wrote to memory of 1420 1272 omsecor.exe 111 PID 1272 wrote to memory of 1420 1272 omsecor.exe 111 PID 1272 wrote to memory of 1420 1272 omsecor.exe 111 PID 1272 wrote to memory of 1420 1272 omsecor.exe 111 PID 1272 wrote to memory of 1420 1272 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe"C:\Users\Admin\AppData\Local\Temp\f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exeC:\Users\Admin\AppData\Local\Temp\f2a4d64a0d9aa0dee4e98b0d2099e94fc62211eda72329960deaeb865131357eN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 2688⤵
- Program crash
PID:3232
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 2926⤵
- Program crash
PID:1204
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 3004⤵
- Program crash
PID:4496
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 2882⤵
- Program crash
PID:1264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4860 -ip 48601⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1988 -ip 19881⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4312 -ip 43121⤵PID:4400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1272 -ip 12721⤵PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55afc1031d062d5ba8d3598b75323d9ed
SHA15768628ccc3ae0b5486e8645977385cd0677d3ec
SHA2567106aabc22040dac419d073493ef2875d659f9bbeab6056d1a17b007e27a1d9c
SHA512a3ae1f0b9e48002bf61c2170cdfcdc4206245e4cd63296f245d3f367eaecf16c4bd01097cc4dc821bfe7e7a87ed1eab54d8509fcf46b68c83214094780d62a41
-
Filesize
96KB
MD5b52ca1e189cb5fbe81f74f0704df65be
SHA1e5071bfd61f584b633c69566cdbe913a0d5b5697
SHA256fc1736abf6af7c2aef555f564606f0df15cf9739524ce13d91ff57f7a8187255
SHA51295c46c8fb5d87d64d3fee878d917ffadec8265d6747bb288bb823987784f2c6114dad964dbc70c81b512f24dc1d48422703540f1f53d4a77b51e3729647f37a8
-
Filesize
96KB
MD55cc2d9858a102461b84f22e4f345e3b8
SHA1c9483c8d2bd44bda9575ebee9b2adf8303f3fd9c
SHA256442911949202dbff4ab43bd4cdb185e28548ed5aedffed569bd2582741d2ecaa
SHA512a26496edb9073585ef94617d1b92898e9ab5dad1feaccf166fd22d1c7341464fb081db4a9ad966606209ad6b17ed788f1d21b233911413e44e4ac7d1a342ca0f