Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe
Resource
win7-20240903-en
General
-
Target
40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe
-
Size
96KB
-
MD5
88de9c6897937c35255ac10b6bac4a66
-
SHA1
ad5b907ac354bbbae4bd1ea9b880a1e90470e172
-
SHA256
40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f
-
SHA512
ccb8b91c545641b5da431fad701e3923fd6a4f85b569cbe26f6aefa3a2ebfcf3d90dc0ddaa2a8a5cc0eb4cbfcb47104b3b6150b27dbef418eee405a7619c9bc6
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:hGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3556 omsecor.exe 3512 omsecor.exe 3256 omsecor.exe 3420 omsecor.exe 2060 omsecor.exe 4772 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1268 set thread context of 4996 1268 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 3556 set thread context of 3512 3556 omsecor.exe 88 PID 3256 set thread context of 3420 3256 omsecor.exe 108 PID 2060 set thread context of 4772 2060 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4236 1268 WerFault.exe 82 4520 3556 WerFault.exe 85 3104 3256 WerFault.exe 107 860 2060 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1268 wrote to memory of 4996 1268 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 1268 wrote to memory of 4996 1268 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 1268 wrote to memory of 4996 1268 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 1268 wrote to memory of 4996 1268 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 1268 wrote to memory of 4996 1268 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 83 PID 4996 wrote to memory of 3556 4996 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 85 PID 4996 wrote to memory of 3556 4996 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 85 PID 4996 wrote to memory of 3556 4996 40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe 85 PID 3556 wrote to memory of 3512 3556 omsecor.exe 88 PID 3556 wrote to memory of 3512 3556 omsecor.exe 88 PID 3556 wrote to memory of 3512 3556 omsecor.exe 88 PID 3556 wrote to memory of 3512 3556 omsecor.exe 88 PID 3556 wrote to memory of 3512 3556 omsecor.exe 88 PID 3512 wrote to memory of 3256 3512 omsecor.exe 107 PID 3512 wrote to memory of 3256 3512 omsecor.exe 107 PID 3512 wrote to memory of 3256 3512 omsecor.exe 107 PID 3256 wrote to memory of 3420 3256 omsecor.exe 108 PID 3256 wrote to memory of 3420 3256 omsecor.exe 108 PID 3256 wrote to memory of 3420 3256 omsecor.exe 108 PID 3256 wrote to memory of 3420 3256 omsecor.exe 108 PID 3256 wrote to memory of 3420 3256 omsecor.exe 108 PID 3420 wrote to memory of 2060 3420 omsecor.exe 110 PID 3420 wrote to memory of 2060 3420 omsecor.exe 110 PID 3420 wrote to memory of 2060 3420 omsecor.exe 110 PID 2060 wrote to memory of 4772 2060 omsecor.exe 112 PID 2060 wrote to memory of 4772 2060 omsecor.exe 112 PID 2060 wrote to memory of 4772 2060 omsecor.exe 112 PID 2060 wrote to memory of 4772 2060 omsecor.exe 112 PID 2060 wrote to memory of 4772 2060 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe"C:\Users\Admin\AppData\Local\Temp\40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exeC:\Users\Admin\AppData\Local\Temp\40a4b0aa4c555c3e71800aba99d22e7d4ae98af226973f398b41f18c4cdf049f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 2688⤵
- Program crash
PID:860
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 2926⤵
- Program crash
PID:3104
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 2884⤵
- Program crash
PID:4520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 2842⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1268 -ip 12681⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3556 -ip 35561⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3256 -ip 32561⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2060 -ip 20601⤵PID:324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a8df9acd1142da4fa6106c54b389bb02
SHA17fa08c6c019d93e2d06d30d6c0ddf7f5483b585e
SHA256dd2ef6e4fb4ac64dfcc4b00f91e41cb62160018d561803f57b39502765efa159
SHA512f6b05b78fd4195984142d99b9e5c11bb133029306ed9e07323ae94776f25df6bf23328ff27a9b59f3090c5894cf37efae1ec134e79897ba84921a24813896a3f
-
Filesize
96KB
MD56f6623357b718ea9224d15a761f8ab21
SHA16496075f9cd639d1962b1c18266dfcc1d0841244
SHA256712046f2e93f4b5d25323e8795b75b4d0cf6df30c7601a5a1b660732689755e5
SHA5129d44f90cf22e930747c446eb3a275fd772370048c76feccf8a7db965fcdbbdfd9a1d9986a965b3212a31ee050f41a75231c9331ea739881bb212d17e9ef2e682
-
Filesize
96KB
MD539754e7aa74398aeda27c8956f02c852
SHA1b34ed02102ebed466111705e78f4b8e6e8e63b9b
SHA256adf9ac5367c7b532d84fecf89241119d9c0ba90a2664a3ad29cf3929f2bb624b
SHA5120246921fb919e36e7012c302feee99803d608e5c7857f08dcfd1ff9577dd5a93e482029b9457673e92875ab48b8268b8c88bd0d38d00adc3af0c90e8f613796c