Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 16:24
Static task
static1
Behavioral task
behavioral1
Sample
202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe
Resource
win7-20240903-en
General
-
Target
202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe
-
Size
134KB
-
MD5
622a24ded3eadc25a3f5f6fac27c8e60
-
SHA1
1d7fe49b2aae07c9cd77860f13b0eb753d3611e1
-
SHA256
202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3deb
-
SHA512
3a7919f01563396d1aab3fc2c2d05c4fa32c754c312daff21c5364e70a17d9264282b17a7bf2e494b864c94f6600eb6b876d5a5d7f19e0e0d2a0dbeffc7e46e8
-
SSDEEP
1536:sDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCin:SiRTeH0iqAW6J6f1tqF6dngNmaZCiaG
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2520 omsecor.exe 3112 omsecor.exe 1484 omsecor.exe 3652 omsecor.exe 4348 omsecor.exe 4512 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1608 set thread context of 1372 1608 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 83 PID 2520 set thread context of 3112 2520 omsecor.exe 87 PID 1484 set thread context of 3652 1484 omsecor.exe 111 PID 4348 set thread context of 4512 4348 omsecor.exe 115 -
Program crash 4 IoCs
pid pid_target Process procid_target 1792 2520 WerFault.exe 85 3012 1608 WerFault.exe 82 4688 1484 WerFault.exe 110 5088 4348 WerFault.exe 113 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1372 1608 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 83 PID 1608 wrote to memory of 1372 1608 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 83 PID 1608 wrote to memory of 1372 1608 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 83 PID 1608 wrote to memory of 1372 1608 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 83 PID 1608 wrote to memory of 1372 1608 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 83 PID 1372 wrote to memory of 2520 1372 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 85 PID 1372 wrote to memory of 2520 1372 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 85 PID 1372 wrote to memory of 2520 1372 202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe 85 PID 2520 wrote to memory of 3112 2520 omsecor.exe 87 PID 2520 wrote to memory of 3112 2520 omsecor.exe 87 PID 2520 wrote to memory of 3112 2520 omsecor.exe 87 PID 2520 wrote to memory of 3112 2520 omsecor.exe 87 PID 2520 wrote to memory of 3112 2520 omsecor.exe 87 PID 3112 wrote to memory of 1484 3112 omsecor.exe 110 PID 3112 wrote to memory of 1484 3112 omsecor.exe 110 PID 3112 wrote to memory of 1484 3112 omsecor.exe 110 PID 1484 wrote to memory of 3652 1484 omsecor.exe 111 PID 1484 wrote to memory of 3652 1484 omsecor.exe 111 PID 1484 wrote to memory of 3652 1484 omsecor.exe 111 PID 1484 wrote to memory of 3652 1484 omsecor.exe 111 PID 1484 wrote to memory of 3652 1484 omsecor.exe 111 PID 3652 wrote to memory of 4348 3652 omsecor.exe 113 PID 3652 wrote to memory of 4348 3652 omsecor.exe 113 PID 3652 wrote to memory of 4348 3652 omsecor.exe 113 PID 4348 wrote to memory of 4512 4348 omsecor.exe 115 PID 4348 wrote to memory of 4512 4348 omsecor.exe 115 PID 4348 wrote to memory of 4512 4348 omsecor.exe 115 PID 4348 wrote to memory of 4512 4348 omsecor.exe 115 PID 4348 wrote to memory of 4512 4348 omsecor.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe"C:\Users\Admin\AppData\Local\Temp\202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exeC:\Users\Admin\AppData\Local\Temp\202257007295d6074ebcd93c9dd7ea1eda9402770f58f547c390555e707d3debN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 2528⤵
- Program crash
PID:5088
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 2926⤵
- Program crash
PID:4688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 2884⤵
- Program crash
PID:1792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 3002⤵
- Program crash
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1608 -ip 16081⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2520 -ip 25201⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1484 -ip 14841⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4348 -ip 43481⤵PID:4592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5d4d610803b5052cafc828ddb482c6fbd
SHA1ad137da6e7ea42d7b71cc7f3319a1ae21ef9dba3
SHA25648b516f3894831842caa26b1ab0660f8740970bbd2718555f3748ab9a61cd6a9
SHA512803d1896991035673cae6e75c3963dad6cf6e9aa660d8e975f8638c4610a35265ba3cd982645f0c1993fc1b6a1ed3cb28eaf4bdbb24648abb76fc80ef0d8df61
-
Filesize
134KB
MD5c124d97d03e9306b3e2620848821c030
SHA19b106f68e68131dfd04c0277d6e8cb5a3f482930
SHA2561343c88c7be55524eb901074f95ad6caaa98e77cae7bb08cf8b4a749f130d673
SHA512c335fd6b073edabed1c1050e485a348d13519800232600e0246622e85ea1c8dbbad2912a0bf276cda584d19a92874c6dbf19655fc526f5a69c378e3a4269aa43
-
Filesize
134KB
MD56d212d59bc74a7637ea958a4893c0d93
SHA1b7f96121e716bd5f37602896e3b5b49fe182006a
SHA256ec4ab18a87532e02b5675d2c6fc1bdedcec7ad6efe47a610719bec055d46f3d1
SHA5124e92ba2a57570b94a4c73ffe786d9e1a2083d7df6c13d0c6f07951e688c32af46499b11e8064c146513cd8da0c56092e935dc759755794b044d142536eb63d80