Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe
Resource
win7-20240903-en
General
-
Target
40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe
-
Size
96KB
-
MD5
88de9c6897937c35255ac10b6bac4a66
-
SHA1
ad5b907ac354bbbae4bd1ea9b880a1e90470e172
-
SHA256
40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f
-
SHA512
ccb8b91c545641b5da431fad701e3923fd6a4f85b569cbe26f6aefa3a2ebfcf3d90dc0ddaa2a8a5cc0eb4cbfcb47104b3b6150b27dbef418eee405a7619c9bc6
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:hGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4400 omsecor.exe 3168 omsecor.exe 2828 omsecor.exe 4032 omsecor.exe 4776 omsecor.exe 4872 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2780 set thread context of 2848 2780 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 4400 set thread context of 3168 4400 omsecor.exe 88 PID 2828 set thread context of 4032 2828 omsecor.exe 109 PID 4776 set thread context of 4872 4776 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4048 2780 WerFault.exe 82 744 4400 WerFault.exe 85 628 2828 WerFault.exe 108 804 4776 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2848 2780 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 2780 wrote to memory of 2848 2780 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 2780 wrote to memory of 2848 2780 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 2780 wrote to memory of 2848 2780 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 2780 wrote to memory of 2848 2780 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 2848 wrote to memory of 4400 2848 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 85 PID 2848 wrote to memory of 4400 2848 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 85 PID 2848 wrote to memory of 4400 2848 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 85 PID 4400 wrote to memory of 3168 4400 omsecor.exe 88 PID 4400 wrote to memory of 3168 4400 omsecor.exe 88 PID 4400 wrote to memory of 3168 4400 omsecor.exe 88 PID 4400 wrote to memory of 3168 4400 omsecor.exe 88 PID 4400 wrote to memory of 3168 4400 omsecor.exe 88 PID 3168 wrote to memory of 2828 3168 omsecor.exe 108 PID 3168 wrote to memory of 2828 3168 omsecor.exe 108 PID 3168 wrote to memory of 2828 3168 omsecor.exe 108 PID 2828 wrote to memory of 4032 2828 omsecor.exe 109 PID 2828 wrote to memory of 4032 2828 omsecor.exe 109 PID 2828 wrote to memory of 4032 2828 omsecor.exe 109 PID 2828 wrote to memory of 4032 2828 omsecor.exe 109 PID 2828 wrote to memory of 4032 2828 omsecor.exe 109 PID 4032 wrote to memory of 4776 4032 omsecor.exe 111 PID 4032 wrote to memory of 4776 4032 omsecor.exe 111 PID 4032 wrote to memory of 4776 4032 omsecor.exe 111 PID 4776 wrote to memory of 4872 4776 omsecor.exe 113 PID 4776 wrote to memory of 4872 4776 omsecor.exe 113 PID 4776 wrote to memory of 4872 4776 omsecor.exe 113 PID 4776 wrote to memory of 4872 4776 omsecor.exe 113 PID 4776 wrote to memory of 4872 4776 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe"C:\Users\Admin\AppData\Local\Temp\40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exeC:\Users\Admin\AppData\Local\Temp\40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 2568⤵
- Program crash
PID:804
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 2926⤵
- Program crash
PID:628
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 2924⤵
- Program crash
PID:744
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 2882⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2780 -ip 27801⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4400 -ip 44001⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2828 -ip 28281⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4776 -ip 47761⤵PID:3884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57e4c98be442c63977394ec32de6e8c92
SHA159c419085fd0e62c1d8aa03d6307fb54be90a51f
SHA256290d1627b7f01b3a7c30862fa38375408d47d3dbbbfd2480b0a3276fef0df093
SHA5122cb3395fa54a3718268c8015e6104a6ea5343185e929da8b8d1e8b214d56f962de7453634e012494f6222e5bafc37c72423e3f52bca3a2dfa238079bcc3b5ac6
-
Filesize
96KB
MD56f6623357b718ea9224d15a761f8ab21
SHA16496075f9cd639d1962b1c18266dfcc1d0841244
SHA256712046f2e93f4b5d25323e8795b75b4d0cf6df30c7601a5a1b660732689755e5
SHA5129d44f90cf22e930747c446eb3a275fd772370048c76feccf8a7db965fcdbbdfd9a1d9986a965b3212a31ee050f41a75231c9331ea739881bb212d17e9ef2e682
-
Filesize
96KB
MD56584d4851b3d89464ba14f2f09d11074
SHA11954546ac2e4aea5e38df7d9666301b52ebc6405
SHA256b6b6603d7e62acd7119e11a20203411e3531d8312a51cf201e0e263bdf921e81
SHA512ff77606d9567d5d894c31cba604c00e1a2cce89a901bd7a26e588a836cfb5ac57c8e8b9bed9196f319c6861dc124ca273afcc6cf8f0583454011452bb454f229