Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 12:06
Static task
static1
Behavioral task
behavioral1
Sample
e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe
Resource
win7-20240903-en
General
-
Target
e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe
-
Size
96KB
-
MD5
0d4c77c54e03092885eca451826d6600
-
SHA1
1bc3797d27d6eceee9ba08bb9db68307e413baf4
-
SHA256
e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7
-
SHA512
417e8604b5fe1e1b59d9800262c252046a44a5ea4af73b7b1de38aed9d7cb27b1258ad25c511a11f567ac14f49ff44c717c84a8fd3f6b200cf487c7e02a4fa1e
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:hGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2392 omsecor.exe 3124 omsecor.exe 3524 omsecor.exe 4616 omsecor.exe 3600 omsecor.exe 4324 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 716 set thread context of 1836 716 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 83 PID 2392 set thread context of 3124 2392 omsecor.exe 88 PID 3524 set thread context of 4616 3524 omsecor.exe 107 PID 3600 set thread context of 4324 3600 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 4044 716 WerFault.exe 82 2792 2392 WerFault.exe 85 3424 3524 WerFault.exe 106 3416 3600 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 716 wrote to memory of 1836 716 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 83 PID 716 wrote to memory of 1836 716 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 83 PID 716 wrote to memory of 1836 716 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 83 PID 716 wrote to memory of 1836 716 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 83 PID 716 wrote to memory of 1836 716 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 83 PID 1836 wrote to memory of 2392 1836 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 85 PID 1836 wrote to memory of 2392 1836 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 85 PID 1836 wrote to memory of 2392 1836 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 85 PID 2392 wrote to memory of 3124 2392 omsecor.exe 88 PID 2392 wrote to memory of 3124 2392 omsecor.exe 88 PID 2392 wrote to memory of 3124 2392 omsecor.exe 88 PID 2392 wrote to memory of 3124 2392 omsecor.exe 88 PID 2392 wrote to memory of 3124 2392 omsecor.exe 88 PID 3124 wrote to memory of 3524 3124 omsecor.exe 106 PID 3124 wrote to memory of 3524 3124 omsecor.exe 106 PID 3124 wrote to memory of 3524 3124 omsecor.exe 106 PID 3524 wrote to memory of 4616 3524 omsecor.exe 107 PID 3524 wrote to memory of 4616 3524 omsecor.exe 107 PID 3524 wrote to memory of 4616 3524 omsecor.exe 107 PID 3524 wrote to memory of 4616 3524 omsecor.exe 107 PID 3524 wrote to memory of 4616 3524 omsecor.exe 107 PID 4616 wrote to memory of 3600 4616 omsecor.exe 109 PID 4616 wrote to memory of 3600 4616 omsecor.exe 109 PID 4616 wrote to memory of 3600 4616 omsecor.exe 109 PID 3600 wrote to memory of 4324 3600 omsecor.exe 111 PID 3600 wrote to memory of 4324 3600 omsecor.exe 111 PID 3600 wrote to memory of 4324 3600 omsecor.exe 111 PID 3600 wrote to memory of 4324 3600 omsecor.exe 111 PID 3600 wrote to memory of 4324 3600 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe"C:\Users\Admin\AppData\Local\Temp\e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exeC:\Users\Admin\AppData\Local\Temp\e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 2568⤵
- Program crash
PID:3416
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 3006⤵
- Program crash
PID:3424
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 2884⤵
- Program crash
PID:2792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 3122⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 716 -ip 7161⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2392 -ip 23921⤵PID:772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3524 -ip 35241⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3600 -ip 36001⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD559ab3ae03316117b4ced216478a060b0
SHA168d5084e066e3fbd5116a9606f77da43eaa9eca8
SHA25677df0776204b0730cb491c58a668965fc77b3078003d021d109126af573616d9
SHA512cdb2e065bac0db9ecb5d5d3dd8aab9e8ebce65609b91a92b54078fa32196c6625dd2492c2477fe91a105c1cf1edbaad1f2afaf871081bac2415f7bb67e57b8d8
-
Filesize
96KB
MD56f68c06e99a7f34d04659a9a740c32e7
SHA126be548942cb021255d6bb67a73cd24610510702
SHA25631e69f71593255d0e69dd1086b2674782b08f84ffc1d7c57c2b7e793c2539b34
SHA512c5c77287c575b1aa7c34d83aa281c5ebc0d7f38b7cb6495936e700d7ddc5f378db9e6014ae20f649c78d7e4bf25b2b96294b50139333a71c5c39b92e1d3bff1b
-
Filesize
96KB
MD523e3b8568654750150f551a2114c3841
SHA162829901a3a26f4021ab9490d3360a29202ddcd5
SHA25683a4d746af4a7c3e49fdb4c701ef906be23ef91106befe4b20fd3f14779b281f
SHA5124748128a66b5c2e68894cde685e2497b30feaaeda76dd01f26f9591231c81646f48d9908df33337acfc294c97b4830533dde8090e1f6e579b58bf7dc90a9d1db