Analysis
-
max time kernel
115s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe
Resource
win7-20240903-en
General
-
Target
adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe
-
Size
96KB
-
MD5
ec04a3795de16f9dfeaa9edb70ace5fc
-
SHA1
1954ba36dd1d907f97763cb41eedf27de33a25cd
-
SHA256
adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b
-
SHA512
4b6067df01b8e39c72e7ef9c2f3d65a271455e14182c8e9094c9490b93181267f32fdf936421a38f90c9b4246f640099cf98ff57b5dd6e6d79220477f93d3044
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:UGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4884 omsecor.exe 1800 omsecor.exe 3772 omsecor.exe 4804 omsecor.exe 1044 omsecor.exe 3252 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 220 set thread context of 4000 220 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 83 PID 4884 set thread context of 1800 4884 omsecor.exe 87 PID 3772 set thread context of 4804 3772 omsecor.exe 108 PID 1044 set thread context of 3252 1044 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 2168 220 WerFault.exe 82 456 4884 WerFault.exe 85 1380 3772 WerFault.exe 107 4016 1044 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 220 wrote to memory of 4000 220 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 83 PID 220 wrote to memory of 4000 220 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 83 PID 220 wrote to memory of 4000 220 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 83 PID 220 wrote to memory of 4000 220 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 83 PID 220 wrote to memory of 4000 220 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 83 PID 4000 wrote to memory of 4884 4000 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 85 PID 4000 wrote to memory of 4884 4000 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 85 PID 4000 wrote to memory of 4884 4000 adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe 85 PID 4884 wrote to memory of 1800 4884 omsecor.exe 87 PID 4884 wrote to memory of 1800 4884 omsecor.exe 87 PID 4884 wrote to memory of 1800 4884 omsecor.exe 87 PID 4884 wrote to memory of 1800 4884 omsecor.exe 87 PID 4884 wrote to memory of 1800 4884 omsecor.exe 87 PID 1800 wrote to memory of 3772 1800 omsecor.exe 107 PID 1800 wrote to memory of 3772 1800 omsecor.exe 107 PID 1800 wrote to memory of 3772 1800 omsecor.exe 107 PID 3772 wrote to memory of 4804 3772 omsecor.exe 108 PID 3772 wrote to memory of 4804 3772 omsecor.exe 108 PID 3772 wrote to memory of 4804 3772 omsecor.exe 108 PID 3772 wrote to memory of 4804 3772 omsecor.exe 108 PID 3772 wrote to memory of 4804 3772 omsecor.exe 108 PID 4804 wrote to memory of 1044 4804 omsecor.exe 110 PID 4804 wrote to memory of 1044 4804 omsecor.exe 110 PID 4804 wrote to memory of 1044 4804 omsecor.exe 110 PID 1044 wrote to memory of 3252 1044 omsecor.exe 112 PID 1044 wrote to memory of 3252 1044 omsecor.exe 112 PID 1044 wrote to memory of 3252 1044 omsecor.exe 112 PID 1044 wrote to memory of 3252 1044 omsecor.exe 112 PID 1044 wrote to memory of 3252 1044 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe"C:\Users\Admin\AppData\Local\Temp\adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exeC:\Users\Admin\AppData\Local\Temp\adb51f4110cdd56015557b44ff751ec1944ba17ce5f8ead5f4ef0c95ebd3e80b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 2408⤵
- Program crash
PID:4016
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3772 -s 2926⤵
- Program crash
PID:1380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 3004⤵
- Program crash
PID:456
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 2882⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 220 -ip 2201⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4884 -ip 48841⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3772 -ip 37721⤵PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1044 -ip 10441⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b93865cfd96726b30234a80db405edcf
SHA1b346aefdcc061fc266060ae946c1b4c876252e76
SHA256e799c0f093e12763d03928380ac4d3f8976a7032039ab2f0508a2a93a10120e4
SHA51235718b7cc99d69eff56cbb94bfba0e4e49bcf1efbd518a15e43b32285ebea696e1623bec6ec8224cbe8fc806e89806ea0d47d61997ee893fc5821be626698934
-
Filesize
96KB
MD56e22816e0e9ededf53a920829c6501a4
SHA1c07419fce920f30bf87d9e811b76b8fcd6bd446c
SHA256e63543bab8532ccf374fe8388bd85759f14e2bb53de21300a971ca4d736c961b
SHA5120a36d991dc1501626a4d77b27c9fc910196f7be961ad2dfdd156914859b8de17bb2ad3f620523bf2a6569ce2069ac4eabb78ebc4ea47b643ad1f8ad7ce4cc6e3
-
Filesize
96KB
MD5b6d4321a9d3a96921cf2a7adc34bee86
SHA196f643ce6ad976d6279a95d0bb477f8fed02498d
SHA256774a7b9455547723f14a82e42472961526b68da20e1e0fdcb3e78b08c79dfadb
SHA51296401b219672a7b90e2183cf0521df25ad6dbba506799379e6a1df0c432e7b627209f2b3ea709d717410c01052f5e89bb1bd79cfafb7add1b9cad47ba10f0bde