Analysis
-
max time kernel
119s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe
Resource
win7-20240903-en
General
-
Target
e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe
-
Size
96KB
-
MD5
2aa5f89187fd0de3d66278fb5b6987f4
-
SHA1
5083dccbf23ecbe9ecb6194e0e2aa43665346b8c
-
SHA256
e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426
-
SHA512
33f22042caf6b2b4aba48fa67262dbb96d7dfa46bc17749b7813863a243c33a640e8d5edce849ba211958e034b6e7f37fa81064efc85efd5ff73894f953185a2
-
SSDEEP
1536:JnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxZ:JGs8cd8eXlYairZYqMddH13Z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3156 omsecor.exe 1136 omsecor.exe 468 omsecor.exe 4772 omsecor.exe 5056 omsecor.exe 2584 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 592 set thread context of 3864 592 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 82 PID 3156 set thread context of 1136 3156 omsecor.exe 87 PID 468 set thread context of 4772 468 omsecor.exe 100 PID 5056 set thread context of 2584 5056 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3372 592 WerFault.exe 81 4700 3156 WerFault.exe 85 1964 468 WerFault.exe 99 3116 5056 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 592 wrote to memory of 3864 592 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 82 PID 592 wrote to memory of 3864 592 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 82 PID 592 wrote to memory of 3864 592 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 82 PID 592 wrote to memory of 3864 592 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 82 PID 592 wrote to memory of 3864 592 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 82 PID 3864 wrote to memory of 3156 3864 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 85 PID 3864 wrote to memory of 3156 3864 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 85 PID 3864 wrote to memory of 3156 3864 e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe 85 PID 3156 wrote to memory of 1136 3156 omsecor.exe 87 PID 3156 wrote to memory of 1136 3156 omsecor.exe 87 PID 3156 wrote to memory of 1136 3156 omsecor.exe 87 PID 3156 wrote to memory of 1136 3156 omsecor.exe 87 PID 3156 wrote to memory of 1136 3156 omsecor.exe 87 PID 1136 wrote to memory of 468 1136 omsecor.exe 99 PID 1136 wrote to memory of 468 1136 omsecor.exe 99 PID 1136 wrote to memory of 468 1136 omsecor.exe 99 PID 468 wrote to memory of 4772 468 omsecor.exe 100 PID 468 wrote to memory of 4772 468 omsecor.exe 100 PID 468 wrote to memory of 4772 468 omsecor.exe 100 PID 468 wrote to memory of 4772 468 omsecor.exe 100 PID 468 wrote to memory of 4772 468 omsecor.exe 100 PID 4772 wrote to memory of 5056 4772 omsecor.exe 102 PID 4772 wrote to memory of 5056 4772 omsecor.exe 102 PID 4772 wrote to memory of 5056 4772 omsecor.exe 102 PID 5056 wrote to memory of 2584 5056 omsecor.exe 104 PID 5056 wrote to memory of 2584 5056 omsecor.exe 104 PID 5056 wrote to memory of 2584 5056 omsecor.exe 104 PID 5056 wrote to memory of 2584 5056 omsecor.exe 104 PID 5056 wrote to memory of 2584 5056 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe"C:\Users\Admin\AppData\Local\Temp\e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exeC:\Users\Admin\AppData\Local\Temp\e397fae69e49b86e344300cf644567a3ded2a81e0dacf0264b615198b5371426.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 2568⤵
- Program crash
PID:3116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 2926⤵
- Program crash
PID:1964
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3156 -s 3004⤵
- Program crash
PID:4700
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 2882⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 592 -ip 5921⤵PID:3788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3156 -ip 31561⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 468 -ip 4681⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5056 -ip 50561⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD51daaf92d215c5c583af538878a650ea4
SHA1cc935697d533a375cdde319a7dbf98423a367e82
SHA256146344b37aa23f0fca4ab026a4a472da7ae35e425721a8f95d26a7e27a030f39
SHA512d4a7d2c3b8e45d074dbe323aaa37d108a04fee9f43be588d43f39b3443be7baba0a16e0c334b4dd52d45e77df7621bdb32bac80754cea7cb6110637ed4bb14d3
-
Filesize
96KB
MD56c39f390a86d659ec7418ca5a0e11efd
SHA1972da8b8a6f95a890d1c67e8442096a7e06fa362
SHA256c73482ed05667cc4672cf01db998df103ead43e9d447da629fa0fd9ba9291fe4
SHA512ddc879b68133892e8e1ca764d842c197b092e66cf9c69a46c8cce6abe2a6107f0d5ec9db80afc7fc247b8d205914485d58e09400b8d847668b1bc617a1c67fa8
-
Filesize
96KB
MD54d1b4f97693693c2a41d3a5b876ed965
SHA118506adc268ea132fc325d2e1290ea99cba13f7a
SHA256642773e513f65e60fbeba9ad9cb6cbdbbdc18ab4affe41aaa6b939c0088bccb1
SHA5129f96510c8a65e273267fbd9fbe70ff22eeea6958433b433fe56dab93c9b9764dae4bd230860cabb230df46b33b7d12b3aed2465710aef5851b9b886ff6fb16e6