Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe
Resource
win7-20240903-en
General
-
Target
04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe
-
Size
96KB
-
MD5
f16d48d2e484c261b18b4bc51e3e8e67
-
SHA1
33ccefea7655343fb83df731d96546cb39f7395f
-
SHA256
04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f
-
SHA512
ff7155e5f2ed84a04192370b0cd1491e183e7ad51c75ba334f60019a376b6f2ef8c366c3ef65f4b1fa4d211f26d73ea25d956451f31f980d32eb4b4ba864c477
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:TGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4012 omsecor.exe 1724 omsecor.exe 1516 omsecor.exe 1960 omsecor.exe 4412 omsecor.exe 1068 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3816 set thread context of 1384 3816 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 82 PID 4012 set thread context of 1724 4012 omsecor.exe 86 PID 1516 set thread context of 1960 1516 omsecor.exe 100 PID 4412 set thread context of 1068 4412 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3708 3816 WerFault.exe 81 3416 4012 WerFault.exe 84 4428 1516 WerFault.exe 99 4388 4412 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3816 wrote to memory of 1384 3816 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 82 PID 3816 wrote to memory of 1384 3816 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 82 PID 3816 wrote to memory of 1384 3816 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 82 PID 3816 wrote to memory of 1384 3816 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 82 PID 3816 wrote to memory of 1384 3816 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 82 PID 1384 wrote to memory of 4012 1384 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 84 PID 1384 wrote to memory of 4012 1384 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 84 PID 1384 wrote to memory of 4012 1384 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 84 PID 4012 wrote to memory of 1724 4012 omsecor.exe 86 PID 4012 wrote to memory of 1724 4012 omsecor.exe 86 PID 4012 wrote to memory of 1724 4012 omsecor.exe 86 PID 4012 wrote to memory of 1724 4012 omsecor.exe 86 PID 4012 wrote to memory of 1724 4012 omsecor.exe 86 PID 1724 wrote to memory of 1516 1724 omsecor.exe 99 PID 1724 wrote to memory of 1516 1724 omsecor.exe 99 PID 1724 wrote to memory of 1516 1724 omsecor.exe 99 PID 1516 wrote to memory of 1960 1516 omsecor.exe 100 PID 1516 wrote to memory of 1960 1516 omsecor.exe 100 PID 1516 wrote to memory of 1960 1516 omsecor.exe 100 PID 1516 wrote to memory of 1960 1516 omsecor.exe 100 PID 1516 wrote to memory of 1960 1516 omsecor.exe 100 PID 1960 wrote to memory of 4412 1960 omsecor.exe 102 PID 1960 wrote to memory of 4412 1960 omsecor.exe 102 PID 1960 wrote to memory of 4412 1960 omsecor.exe 102 PID 4412 wrote to memory of 1068 4412 omsecor.exe 104 PID 4412 wrote to memory of 1068 4412 omsecor.exe 104 PID 4412 wrote to memory of 1068 4412 omsecor.exe 104 PID 4412 wrote to memory of 1068 4412 omsecor.exe 104 PID 4412 wrote to memory of 1068 4412 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe"C:\Users\Admin\AppData\Local\Temp\04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exeC:\Users\Admin\AppData\Local\Temp\04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 2688⤵
- Program crash
PID:4388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 2926⤵
- Program crash
PID:4428
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 2724⤵
- Program crash
PID:3416
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 3002⤵
- Program crash
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3816 -ip 38161⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4012 -ip 40121⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1516 -ip 15161⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4412 -ip 44121⤵PID:3136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c767d4874bef05c1838c65a91c78fc2e
SHA1e37b56e9ea867ae888de9aaeced922c78ebe9dba
SHA256734f6a3e92ac068d3b69140644b81aa7bd0077347cf7a4b9f7736c62c53a092e
SHA5127eff5bd172e75e8046964f1b5eba5bb3da93735d7cceea901bf624b576056e5e03ad87eaf77e7e857802dc5e26b0af4a1861638cb6106ea68d67415e5c7bff01
-
Filesize
96KB
MD55912020c87e7edbb1cb93da5086d3e20
SHA14fce9bd50a55886d4824513ae51913ac48ac36e2
SHA2568a8b8f40916b8cda22586806e4ea0d21eafe83c46300ce7a59601204da4f1b13
SHA512f29f4b08efad45a5e3b77ae368e69395700c9375ffcc1f9300e3a67fc5c39db25ad5f31ab39bd733b9932996ec7c9e8f061514bf41780b99819f51e44c006c8c
-
Filesize
96KB
MD536d01d5a118d54b5256ffa771668b623
SHA144bd3eb513e0a467cb4fd61cf351085d8a277b46
SHA2562a27a863baa3922c17f4eea502b024e7516d6b3487471d536e308b971fac35b8
SHA5121c6dbb15715377fbaf742f875b8d4435abddeeeac42c194c1611b561490b1b8801338b9be5f69f4e738c496461984b1ff2471db7858a0a07da2c4050e156e3b1