Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe
Resource
win7-20240903-en
General
-
Target
c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe
-
Size
96KB
-
MD5
7c9673f460d47c60a428b24e95da3234
-
SHA1
db93ad32c3a13eaa5125883eba263c92e2ec9860
-
SHA256
c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43
-
SHA512
34d78af9ae82942af4423b61b8ed662c14b6eb4d1af71cbf00ecdf00aa544f7d82a4466c601a75bcdd471f402138477f7b1b4c439a4a27410cddba6d08c8b90f
-
SSDEEP
1536:dnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:dGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 5008 omsecor.exe 3624 omsecor.exe 4180 omsecor.exe 2168 omsecor.exe 1172 omsecor.exe 4168 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4804 set thread context of 864 4804 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 83 PID 5008 set thread context of 3624 5008 omsecor.exe 87 PID 4180 set thread context of 2168 4180 omsecor.exe 109 PID 1172 set thread context of 4168 1172 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4416 4804 WerFault.exe 82 3640 5008 WerFault.exe 86 2696 4180 WerFault.exe 108 3652 1172 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4804 wrote to memory of 864 4804 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 83 PID 4804 wrote to memory of 864 4804 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 83 PID 4804 wrote to memory of 864 4804 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 83 PID 4804 wrote to memory of 864 4804 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 83 PID 4804 wrote to memory of 864 4804 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 83 PID 864 wrote to memory of 5008 864 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 86 PID 864 wrote to memory of 5008 864 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 86 PID 864 wrote to memory of 5008 864 c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe 86 PID 5008 wrote to memory of 3624 5008 omsecor.exe 87 PID 5008 wrote to memory of 3624 5008 omsecor.exe 87 PID 5008 wrote to memory of 3624 5008 omsecor.exe 87 PID 5008 wrote to memory of 3624 5008 omsecor.exe 87 PID 5008 wrote to memory of 3624 5008 omsecor.exe 87 PID 3624 wrote to memory of 4180 3624 omsecor.exe 108 PID 3624 wrote to memory of 4180 3624 omsecor.exe 108 PID 3624 wrote to memory of 4180 3624 omsecor.exe 108 PID 4180 wrote to memory of 2168 4180 omsecor.exe 109 PID 4180 wrote to memory of 2168 4180 omsecor.exe 109 PID 4180 wrote to memory of 2168 4180 omsecor.exe 109 PID 4180 wrote to memory of 2168 4180 omsecor.exe 109 PID 4180 wrote to memory of 2168 4180 omsecor.exe 109 PID 2168 wrote to memory of 1172 2168 omsecor.exe 111 PID 2168 wrote to memory of 1172 2168 omsecor.exe 111 PID 2168 wrote to memory of 1172 2168 omsecor.exe 111 PID 1172 wrote to memory of 4168 1172 omsecor.exe 113 PID 1172 wrote to memory of 4168 1172 omsecor.exe 113 PID 1172 wrote to memory of 4168 1172 omsecor.exe 113 PID 1172 wrote to memory of 4168 1172 omsecor.exe 113 PID 1172 wrote to memory of 4168 1172 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe"C:\Users\Admin\AppData\Local\Temp\c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exeC:\Users\Admin\AppData\Local\Temp\c02e508952d9104df5ffa75078754ef36be4a8806aacc0e6c0d5d7b09b5c0a43.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 2568⤵
- Program crash
PID:3652
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 2926⤵
- Program crash
PID:2696
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 2884⤵
- Program crash
PID:3640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 2882⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4804 -ip 48041⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5008 -ip 50081⤵PID:3104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4180 -ip 41801⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1172 -ip 11721⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5be71fba9985cd707de272c9a16a97420
SHA1d1e7fdd5136b0c8c557d0ff64fca3dc7bd2606a3
SHA2563d11fa2aeadd485b92884c97a476c9dab2a08923b09929d616670b295db86a51
SHA512ecd3ffc0b97339aad5168ed688c2cfb654cf0e926874bd7e09696155e69ca8488be3ec466b9a6e0258e77051974c646f7719595e94d006bc4c56c3b12ee584b2
-
Filesize
96KB
MD5d08e1990f58a9219c2f51359410dfbe9
SHA1f73718d2c152301446b872b48ef107bff04c6cdb
SHA25611d44cb716739ca0a673dede2ece15e158ca96b4e1718d6f5be8638df8c7a61c
SHA512ac235b81a67bd101499daac8603a96054966131ab38743e3d11cbd10255209156d9f7ad82f036bec8be394a460207b815eaadfd3b2087754751fce6e5a01413e
-
Filesize
96KB
MD5d40180dcdc1957c8e9e1cb7a581c2d4b
SHA1f5046ef3d25991b66b95aa492beb7fce269adcf6
SHA2563ac7414736f8042d388ea2bdf40f0db40e7a7bb37fe644bbcfda51778192932b
SHA51239cf3cb8dae1296c321f38876ad22948232b1943b5a09d5ba1372661872cdb4897b0ad8c27447b6c3da7b54bc4a83c38671ef61ca8b5e6823778517796767a1c