Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 21:04
Static task
static1
Behavioral task
behavioral1
Sample
44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe
Resource
win7-20240903-en
General
-
Target
44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe
-
Size
96KB
-
MD5
3f1bd47cf849006f14844a2e79352954
-
SHA1
b186553da22bd16e8ff4d72743d8533cfe9667dd
-
SHA256
44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17
-
SHA512
baf93d533d0c680620d665fdf1b6e16770b6273709d71c4ca4a2c6132d2d18aec12db1a6a93fbac3c5b0b9fbd53ad39113cb889de090706acb969ac695d11d42
-
SSDEEP
1536:lnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxD:lGs8cd8eXlYairZYqMddH13D
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 904 omsecor.exe 4212 omsecor.exe 1080 omsecor.exe 928 omsecor.exe 64 omsecor.exe 2532 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3976 set thread context of 2724 3976 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 82 PID 904 set thread context of 4212 904 omsecor.exe 86 PID 1080 set thread context of 928 1080 omsecor.exe 100 PID 64 set thread context of 2532 64 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 1656 904 WerFault.exe 85 3288 3976 WerFault.exe 81 2796 1080 WerFault.exe 99 1328 64 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3976 wrote to memory of 2724 3976 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 82 PID 3976 wrote to memory of 2724 3976 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 82 PID 3976 wrote to memory of 2724 3976 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 82 PID 3976 wrote to memory of 2724 3976 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 82 PID 3976 wrote to memory of 2724 3976 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 82 PID 2724 wrote to memory of 904 2724 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 85 PID 2724 wrote to memory of 904 2724 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 85 PID 2724 wrote to memory of 904 2724 44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe 85 PID 904 wrote to memory of 4212 904 omsecor.exe 86 PID 904 wrote to memory of 4212 904 omsecor.exe 86 PID 904 wrote to memory of 4212 904 omsecor.exe 86 PID 904 wrote to memory of 4212 904 omsecor.exe 86 PID 904 wrote to memory of 4212 904 omsecor.exe 86 PID 4212 wrote to memory of 1080 4212 omsecor.exe 99 PID 4212 wrote to memory of 1080 4212 omsecor.exe 99 PID 4212 wrote to memory of 1080 4212 omsecor.exe 99 PID 1080 wrote to memory of 928 1080 omsecor.exe 100 PID 1080 wrote to memory of 928 1080 omsecor.exe 100 PID 1080 wrote to memory of 928 1080 omsecor.exe 100 PID 1080 wrote to memory of 928 1080 omsecor.exe 100 PID 1080 wrote to memory of 928 1080 omsecor.exe 100 PID 928 wrote to memory of 64 928 omsecor.exe 102 PID 928 wrote to memory of 64 928 omsecor.exe 102 PID 928 wrote to memory of 64 928 omsecor.exe 102 PID 64 wrote to memory of 2532 64 omsecor.exe 104 PID 64 wrote to memory of 2532 64 omsecor.exe 104 PID 64 wrote to memory of 2532 64 omsecor.exe 104 PID 64 wrote to memory of 2532 64 omsecor.exe 104 PID 64 wrote to memory of 2532 64 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe"C:\Users\Admin\AppData\Local\Temp\44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exeC:\Users\Admin\AppData\Local\Temp\44069e8ca902004647f0f557a92a4d273e6942ecc88f9b44687c2e8a9cb2ec17.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 2688⤵
- Program crash
PID:1328
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 2926⤵
- Program crash
PID:2796
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 904 -s 2964⤵
- Program crash
PID:1656
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 2882⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3976 -ip 39761⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 904 -ip 9041⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1080 -ip 10801⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 64 -ip 641⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5aef4f2feeeed48c47d4ccd4adc90bbec
SHA186b5dd4559db455193387393498cfa5c104afa49
SHA2569319b635cb437ca809ce5aa1e7c49fbfabc3b18dd76ce87f0c5033b640f358d1
SHA512bedafd1eb8d93dd9cae24244e68519e35fa9189f802d2534860e0d8eff4ea61119d97e3ab9fef45b371311456ec76e9c4be690244c2ca0c2d47dcf4de0b18692
-
Filesize
96KB
MD5897654eac308bec4516a039c591b1681
SHA1e0d5e9b26c3ad2cc3521b26271eee3ba1c97a6c9
SHA256ac44f5469d7faaf4ea80b60b7662ac6b3990df9bacae7743376f7de712f5f85a
SHA512cd213fbe46bdedc96e95e9bfd42eeba72a18da8bd3b84159e49e7948f0185d6d593e625c70880884634becb74db0253de28f6ff0c6dba18c1b02e2c077ccb1dc
-
Filesize
96KB
MD59467b667bf75a203859937a43a0d13b3
SHA158d7d83b1da38b9b45a79719ec3cd696add5a817
SHA25643d6246bc66cce428799bbe24c2abe6021563a1112cfee99e07178db1dd56c04
SHA512133987e0dd33b2fc3eadf36af9489c0426e7e13d82680c8ce1aa14901f2cd47ae99ad78a7ef13e85a019e92462d9188bf3f90d4dc8f64edd33121c2647c7187a