Analysis
-
max time kernel
114s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe
Resource
win7-20240903-en
General
-
Target
6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe
-
Size
96KB
-
MD5
0eab4d97804a75be8a67c5423e3f8810
-
SHA1
9098c6d913d65a869e62fd630aa7e91736b26f12
-
SHA256
6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1
-
SHA512
9236120c3a6c6602d5e266c4150c8a4398f4e1a5778332a353c84edcf1fe1a4cae9cd82ff0d93171a514666bf275f16928412822816e83523cf1ea3bbb5fdca3
-
SSDEEP
1536:+nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:+Gs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2260 omsecor.exe 3484 omsecor.exe 3916 omsecor.exe 3116 omsecor.exe 3776 omsecor.exe 3304 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2384 set thread context of 4724 2384 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 82 PID 2260 set thread context of 3484 2260 omsecor.exe 86 PID 3916 set thread context of 3116 3916 omsecor.exe 100 PID 3776 set thread context of 3304 3776 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 4888 2384 WerFault.exe 81 2400 2260 WerFault.exe 84 4124 3916 WerFault.exe 99 1436 3776 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2384 wrote to memory of 4724 2384 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 82 PID 2384 wrote to memory of 4724 2384 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 82 PID 2384 wrote to memory of 4724 2384 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 82 PID 2384 wrote to memory of 4724 2384 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 82 PID 2384 wrote to memory of 4724 2384 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 82 PID 4724 wrote to memory of 2260 4724 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 84 PID 4724 wrote to memory of 2260 4724 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 84 PID 4724 wrote to memory of 2260 4724 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 84 PID 2260 wrote to memory of 3484 2260 omsecor.exe 86 PID 2260 wrote to memory of 3484 2260 omsecor.exe 86 PID 2260 wrote to memory of 3484 2260 omsecor.exe 86 PID 2260 wrote to memory of 3484 2260 omsecor.exe 86 PID 2260 wrote to memory of 3484 2260 omsecor.exe 86 PID 3484 wrote to memory of 3916 3484 omsecor.exe 99 PID 3484 wrote to memory of 3916 3484 omsecor.exe 99 PID 3484 wrote to memory of 3916 3484 omsecor.exe 99 PID 3916 wrote to memory of 3116 3916 omsecor.exe 100 PID 3916 wrote to memory of 3116 3916 omsecor.exe 100 PID 3916 wrote to memory of 3116 3916 omsecor.exe 100 PID 3916 wrote to memory of 3116 3916 omsecor.exe 100 PID 3916 wrote to memory of 3116 3916 omsecor.exe 100 PID 3116 wrote to memory of 3776 3116 omsecor.exe 102 PID 3116 wrote to memory of 3776 3116 omsecor.exe 102 PID 3116 wrote to memory of 3776 3116 omsecor.exe 102 PID 3776 wrote to memory of 3304 3776 omsecor.exe 103 PID 3776 wrote to memory of 3304 3776 omsecor.exe 103 PID 3776 wrote to memory of 3304 3776 omsecor.exe 103 PID 3776 wrote to memory of 3304 3776 omsecor.exe 103 PID 3776 wrote to memory of 3304 3776 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe"C:\Users\Admin\AppData\Local\Temp\6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exeC:\Users\Admin\AppData\Local\Temp\6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 2568⤵
- Program crash
PID:1436
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 2926⤵
- Program crash
PID:4124
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 2884⤵
- Program crash
PID:2400
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 2882⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2384 -ip 23841⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2260 -ip 22601⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3916 -ip 39161⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3776 -ip 37761⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53d170f5825b2bc18f49c81c6c28029a0
SHA1bc6a4af3818cb906608f1118ee1948432cff4eb6
SHA2560753bded55ce7afc037cc30c230a6a691daa907f5c50d1ab13d0254ac87512fb
SHA512eedfc4df877321aa170c2fbb2b9e4a9494e513dd37a11c4555137d2212a55c81a62abf5573f1852eac918d18acc006879f722b3a2863f218bcbb8873b2feb083
-
Filesize
96KB
MD56f456f4cd9b8d9c35f7a567fb0ba2a01
SHA108a8f335c10969487b4f78b03ed4cc324bb637ed
SHA25641db6943310bd959877ba0d76d8a6be5f38ecc1bebb7cf0c1ddb495a0abebad5
SHA51270a1b97788ff7cd4a296b95a50e1de34273eba9ff519041a5089477530f1843ec41bd2b168dc2aa174d9d45e9db0fb842e557ab66bf376a8aed7447e890835c9
-
Filesize
96KB
MD55c818824ff5872b256097a1b3aa42ef6
SHA1456311878452643f72bc587efd349ce2d675cbcc
SHA2566fb2fb8d025b69d643aa94da1f9ac6c3c81b21b485afe0d24f02ad1d604fa62c
SHA5128b392de46bd05090d1601150e7bc4ce2f4be92ae793353bb83faff7dae6ed6c02ef092e53f2dad790bf9ca71d78e29c5280efdfd2a82019f75cfbfb78e2c16e5