Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe
Resource
win7-20240903-en
General
-
Target
90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe
-
Size
96KB
-
MD5
dce20b254bff3c538292d9f361f93d75
-
SHA1
bb68615d37020a329f20aa12e0731ac55fcd31ec
-
SHA256
90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a
-
SHA512
08487c992b0c3cbed96e0e04e4211d9b008f3510be266b685ee4283c047b5b4b28d02573c0fe548449dfe1b54e6fcd7aabb606016035edcd65a0ae43d0f6fb0b
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:UGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2612 omsecor.exe 1624 omsecor.exe 4668 omsecor.exe 4352 omsecor.exe 2516 omsecor.exe 2564 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 440 set thread context of 1584 440 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 82 PID 2612 set thread context of 1624 2612 omsecor.exe 86 PID 4668 set thread context of 4352 4668 omsecor.exe 100 PID 2516 set thread context of 2564 2516 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3192 2612 WerFault.exe 84 2128 440 WerFault.exe 81 1476 4668 WerFault.exe 99 5036 2516 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 440 wrote to memory of 1584 440 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 82 PID 440 wrote to memory of 1584 440 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 82 PID 440 wrote to memory of 1584 440 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 82 PID 440 wrote to memory of 1584 440 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 82 PID 440 wrote to memory of 1584 440 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 82 PID 1584 wrote to memory of 2612 1584 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 84 PID 1584 wrote to memory of 2612 1584 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 84 PID 1584 wrote to memory of 2612 1584 90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe 84 PID 2612 wrote to memory of 1624 2612 omsecor.exe 86 PID 2612 wrote to memory of 1624 2612 omsecor.exe 86 PID 2612 wrote to memory of 1624 2612 omsecor.exe 86 PID 2612 wrote to memory of 1624 2612 omsecor.exe 86 PID 2612 wrote to memory of 1624 2612 omsecor.exe 86 PID 1624 wrote to memory of 4668 1624 omsecor.exe 99 PID 1624 wrote to memory of 4668 1624 omsecor.exe 99 PID 1624 wrote to memory of 4668 1624 omsecor.exe 99 PID 4668 wrote to memory of 4352 4668 omsecor.exe 100 PID 4668 wrote to memory of 4352 4668 omsecor.exe 100 PID 4668 wrote to memory of 4352 4668 omsecor.exe 100 PID 4668 wrote to memory of 4352 4668 omsecor.exe 100 PID 4668 wrote to memory of 4352 4668 omsecor.exe 100 PID 4352 wrote to memory of 2516 4352 omsecor.exe 102 PID 4352 wrote to memory of 2516 4352 omsecor.exe 102 PID 4352 wrote to memory of 2516 4352 omsecor.exe 102 PID 2516 wrote to memory of 2564 2516 omsecor.exe 104 PID 2516 wrote to memory of 2564 2516 omsecor.exe 104 PID 2516 wrote to memory of 2564 2516 omsecor.exe 104 PID 2516 wrote to memory of 2564 2516 omsecor.exe 104 PID 2516 wrote to memory of 2564 2516 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe"C:\Users\Admin\AppData\Local\Temp\90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exeC:\Users\Admin\AppData\Local\Temp\90ed83560c03ef781567bd3259ebb5f016bfc11819c3e340638f6b29d2ba1a7a.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 2568⤵
- Program crash
PID:5036
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 3006⤵
- Program crash
PID:1476
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2844⤵
- Program crash
PID:3192
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 2882⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 440 -ip 4401⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2612 -ip 26121⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4668 -ip 46681⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2516 -ip 25161⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a5acb5f4ebe7af67e96e22b5c982ad17
SHA168af6927409e060fa0eecbef7a7db4b7190018b9
SHA2563156ce0be9cf093ed69bb2f19ac787ba7bc7129a2efb4260b8033636b75b01ea
SHA5127aaac94819d332def7fe174af3ceb3d805d418321b55bb0f4a879be569e42a9a173eef5010b08ba5cd3c14f21fdb59f1d1a3542c39239ae13443fec8c10a709c
-
Filesize
96KB
MD5866ec7348f947c6e9f6945142169618c
SHA15f8628aa57d57dad7c274373cbcbbcb6b465aa73
SHA2561630543be5497460eb1efab0a8071bbbfa3da5781885cbeaebe0f130bce44403
SHA512f6c7aca85fa0442511fc4f2e7b547b9b71eac66d4a88dbca5a5d3e648c1e8adf428239e21a5b6b8899915c598373c75147e9857e7a7ffbf6956bd4c1353042f4
-
Filesize
96KB
MD5d1ae4350a2393895ee4257de16871529
SHA1a6aece3863793f69c50deae7f1fc01c014bf274e
SHA256cc059ac7aac2e224b1782cf23bd937bf93d5ba23de5d3c53116b5e0f87360df5
SHA51240424691cc402c66ae63c340b72aaa14e27be8f69178622c80cdd2493cc0f446197953ed8ea4cb33f6008faef4d5136b0c4217e32f279d78d2a8e73391ab96f1