Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe
Resource
win7-20240903-en
General
-
Target
a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe
-
Size
96KB
-
MD5
29807b887ed6d3269d66270ffe028030
-
SHA1
2f02bbff135c5a402618b7c25f377f7bd7ceca3e
-
SHA256
a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1c
-
SHA512
9187b1944d2e8a92610519acb62e58eb693b04d346e29e8875c7155230e81abbd84189c7f59275b177208ba97ac84ad20ee55672dc015cf6fd40a92da6673db0
-
SSDEEP
1536:WnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:WGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1000 omsecor.exe 2144 omsecor.exe 2696 omsecor.exe 4508 omsecor.exe 4040 omsecor.exe 3472 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4224 set thread context of 4192 4224 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 83 PID 1000 set thread context of 2144 1000 omsecor.exe 87 PID 2696 set thread context of 4508 2696 omsecor.exe 109 PID 4040 set thread context of 3472 4040 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4908 4224 WerFault.exe 82 1452 1000 WerFault.exe 85 3140 2696 WerFault.exe 108 1584 4040 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4192 4224 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 83 PID 4224 wrote to memory of 4192 4224 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 83 PID 4224 wrote to memory of 4192 4224 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 83 PID 4224 wrote to memory of 4192 4224 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 83 PID 4224 wrote to memory of 4192 4224 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 83 PID 4192 wrote to memory of 1000 4192 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 85 PID 4192 wrote to memory of 1000 4192 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 85 PID 4192 wrote to memory of 1000 4192 a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe 85 PID 1000 wrote to memory of 2144 1000 omsecor.exe 87 PID 1000 wrote to memory of 2144 1000 omsecor.exe 87 PID 1000 wrote to memory of 2144 1000 omsecor.exe 87 PID 1000 wrote to memory of 2144 1000 omsecor.exe 87 PID 1000 wrote to memory of 2144 1000 omsecor.exe 87 PID 2144 wrote to memory of 2696 2144 omsecor.exe 108 PID 2144 wrote to memory of 2696 2144 omsecor.exe 108 PID 2144 wrote to memory of 2696 2144 omsecor.exe 108 PID 2696 wrote to memory of 4508 2696 omsecor.exe 109 PID 2696 wrote to memory of 4508 2696 omsecor.exe 109 PID 2696 wrote to memory of 4508 2696 omsecor.exe 109 PID 2696 wrote to memory of 4508 2696 omsecor.exe 109 PID 2696 wrote to memory of 4508 2696 omsecor.exe 109 PID 4508 wrote to memory of 4040 4508 omsecor.exe 111 PID 4508 wrote to memory of 4040 4508 omsecor.exe 111 PID 4508 wrote to memory of 4040 4508 omsecor.exe 111 PID 4040 wrote to memory of 3472 4040 omsecor.exe 113 PID 4040 wrote to memory of 3472 4040 omsecor.exe 113 PID 4040 wrote to memory of 3472 4040 omsecor.exe 113 PID 4040 wrote to memory of 3472 4040 omsecor.exe 113 PID 4040 wrote to memory of 3472 4040 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe"C:\Users\Admin\AppData\Local\Temp\a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exeC:\Users\Admin\AppData\Local\Temp\a2a9bc05a17f1cdce623b4003140876adccd3b7168b83b8ea9865ed792b74b1cN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 2568⤵
- Program crash
PID:1584
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 2926⤵
- Program crash
PID:3140
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1000 -s 2884⤵
- Program crash
PID:1452
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 2882⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4224 -ip 42241⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1000 -ip 10001⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2696 -ip 26961⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4040 -ip 40401⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52e416a0203ea011e2dffd7231463c8bf
SHA15669ff9039ffb9bbedab3bcc44c84bfbaaf67255
SHA256797826c2cf882c16802e7156fc84d8c60756c120a83a7789321421a3a2f0da55
SHA51228f20080ae7560319bf314c3a1364d3fbb6888f302e1522cc79818da853247bbe9217752072a6242ef6c7cbe02adc24768faa6bbf0b76ba1b886856a31cb8238
-
Filesize
96KB
MD5f8c33d7af451a837c5dd559389f9b849
SHA1096dcfa7040b4fc3c40ac66d95de5ed3ab3d363b
SHA2566b16646e824197e8da9d53fb38247e1e5110a6089e99a8f8648a8ba1549e5016
SHA5128360c447abe9e9d57e1b77494151d112ad160c63d2929bfd8e854380c8f25870c853038d7a5ba814389f10a3e4f37c177fa393c7894de05a33e6d4166e37f374
-
Filesize
96KB
MD5960f76fb0c1672cae1828127330900e1
SHA14b68c8dfbae1df9b99c9989f7d49ac53cc891ca0
SHA256db541a57c75cdfe4367f44084c1bd04db0fb912468b4b8dac02b52dd41926612
SHA5125ccdd210d8a62f4e08ddd078d105ecd031ca32ed983f726d46c1b4ca3a04264cbc9cdb0bec77d788da70331a99489b8956d92271f294cf08a17a1a71b909678a