Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe
Resource
win7-20240903-en
General
-
Target
3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe
-
Size
96KB
-
MD5
2417ed6e2b275f1f0f254ffeecf1d9fe
-
SHA1
e77863df7b7a0983b5b4db7958dd301bfaa9b6dc
-
SHA256
3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f
-
SHA512
794f5a0587630a29fc3c91131d26d249b5acf47080b033558361b3edd5ceb4d0dabc2c20f85eef6aa16658794a878a60d332830084594a807249e666d528228f
-
SSDEEP
1536:QnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:QGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1236 omsecor.exe 4576 omsecor.exe 3236 omsecor.exe 2836 omsecor.exe 4540 omsecor.exe 4116 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4072 set thread context of 4536 4072 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 83 PID 1236 set thread context of 4576 1236 omsecor.exe 88 PID 3236 set thread context of 2836 3236 omsecor.exe 107 PID 4540 set thread context of 4116 4540 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 4020 4072 WerFault.exe 82 3688 1236 WerFault.exe 85 4836 3236 WerFault.exe 106 4504 4540 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4072 wrote to memory of 4536 4072 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 83 PID 4072 wrote to memory of 4536 4072 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 83 PID 4072 wrote to memory of 4536 4072 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 83 PID 4072 wrote to memory of 4536 4072 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 83 PID 4072 wrote to memory of 4536 4072 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 83 PID 4536 wrote to memory of 1236 4536 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 85 PID 4536 wrote to memory of 1236 4536 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 85 PID 4536 wrote to memory of 1236 4536 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 85 PID 1236 wrote to memory of 4576 1236 omsecor.exe 88 PID 1236 wrote to memory of 4576 1236 omsecor.exe 88 PID 1236 wrote to memory of 4576 1236 omsecor.exe 88 PID 1236 wrote to memory of 4576 1236 omsecor.exe 88 PID 1236 wrote to memory of 4576 1236 omsecor.exe 88 PID 4576 wrote to memory of 3236 4576 omsecor.exe 106 PID 4576 wrote to memory of 3236 4576 omsecor.exe 106 PID 4576 wrote to memory of 3236 4576 omsecor.exe 106 PID 3236 wrote to memory of 2836 3236 omsecor.exe 107 PID 3236 wrote to memory of 2836 3236 omsecor.exe 107 PID 3236 wrote to memory of 2836 3236 omsecor.exe 107 PID 3236 wrote to memory of 2836 3236 omsecor.exe 107 PID 3236 wrote to memory of 2836 3236 omsecor.exe 107 PID 2836 wrote to memory of 4540 2836 omsecor.exe 109 PID 2836 wrote to memory of 4540 2836 omsecor.exe 109 PID 2836 wrote to memory of 4540 2836 omsecor.exe 109 PID 4540 wrote to memory of 4116 4540 omsecor.exe 111 PID 4540 wrote to memory of 4116 4540 omsecor.exe 111 PID 4540 wrote to memory of 4116 4540 omsecor.exe 111 PID 4540 wrote to memory of 4116 4540 omsecor.exe 111 PID 4540 wrote to memory of 4116 4540 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe"C:\Users\Admin\AppData\Local\Temp\3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exeC:\Users\Admin\AppData\Local\Temp\3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 2528⤵
- Program crash
PID:4504
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3236 -s 2926⤵
- Program crash
PID:4836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 2884⤵
- Program crash
PID:3688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 2882⤵
- Program crash
PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4072 -ip 40721⤵PID:4820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1236 -ip 12361⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3236 -ip 32361⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4540 -ip 45401⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59cb03ffdc66b0940a3ef2ef5627e7fe9
SHA1bf7bac57cec4da0a136c6c145e830cd72e399eb3
SHA25651afd0052cc6ea24b8efc84d5e18b280ee1f967995c5c090b5f18c8d802bfadc
SHA512e7423af89dd1d88b8986fc11c7b92af3e96300e038d330c442100948906e295ee30e7f7e9692e221b9d61b680b66c1d18442cd8c8728b0672f8cb456c6b81bdb
-
Filesize
96KB
MD5bcb66cc3f20450c9b9adee6530b57e48
SHA10aaa7f52a78f784821eb67625d2b36f150e3e77f
SHA2567e6d328fc82a19fc346bfe9e3e41a7e4cc30d1c89f06605d498be76e9491dc04
SHA512883564c35399babaf5cd1b7e5bc9de2f9cf838bb4963a0a359c6f238f11bd536a29ab6904824178214fe7d203df2969ac0009880011262cd84a1bf8d9a5eef86
-
Filesize
96KB
MD596199398c567272ac876a9fe65937114
SHA127cf280f15fe30e7891481a96c3cd598818c595d
SHA256dadd10960e52dfb19229e52baa31569ac61a31a307451e36cf81b2aa11ccaae0
SHA5126e098f6cd0071ce9ddac1e1549a19e7b4ca06fc60d5ed5ae28f95f09c8bdb623fe1409fe80645aa26ecd5e17f77f29f1aeaa1c00c15a0c9b4d8de42abb1adddd