Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe
Resource
win7-20240708-en
General
-
Target
0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe
-
Size
96KB
-
MD5
5c0ec8ffb50b2d126ed6d9b45bd1f3f0
-
SHA1
c49b4b3a4800e2bf3c13e0b62d4c145e93a7e4ea
-
SHA256
0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3
-
SHA512
9552fb001804ed8fab4f7294eb88d8f52a756db6eacf3cecaa2eebfd838a21e99ab5a61c0e4c12ed3c25018c2b801fe6834329b90f7d8a7d09f46dd067b9764d
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:zGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2372 omsecor.exe 4688 omsecor.exe 1104 omsecor.exe 4972 omsecor.exe 4308 omsecor.exe 2296 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3240 set thread context of 4088 3240 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 82 PID 2372 set thread context of 4688 2372 omsecor.exe 87 PID 1104 set thread context of 4972 1104 omsecor.exe 100 PID 4308 set thread context of 2296 4308 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 728 3240 WerFault.exe 81 3036 2372 WerFault.exe 84 3256 1104 WerFault.exe 99 2884 4308 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4088 3240 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 82 PID 3240 wrote to memory of 4088 3240 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 82 PID 3240 wrote to memory of 4088 3240 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 82 PID 3240 wrote to memory of 4088 3240 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 82 PID 3240 wrote to memory of 4088 3240 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 82 PID 4088 wrote to memory of 2372 4088 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 84 PID 4088 wrote to memory of 2372 4088 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 84 PID 4088 wrote to memory of 2372 4088 0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe 84 PID 2372 wrote to memory of 4688 2372 omsecor.exe 87 PID 2372 wrote to memory of 4688 2372 omsecor.exe 87 PID 2372 wrote to memory of 4688 2372 omsecor.exe 87 PID 2372 wrote to memory of 4688 2372 omsecor.exe 87 PID 2372 wrote to memory of 4688 2372 omsecor.exe 87 PID 4688 wrote to memory of 1104 4688 omsecor.exe 99 PID 4688 wrote to memory of 1104 4688 omsecor.exe 99 PID 4688 wrote to memory of 1104 4688 omsecor.exe 99 PID 1104 wrote to memory of 4972 1104 omsecor.exe 100 PID 1104 wrote to memory of 4972 1104 omsecor.exe 100 PID 1104 wrote to memory of 4972 1104 omsecor.exe 100 PID 1104 wrote to memory of 4972 1104 omsecor.exe 100 PID 1104 wrote to memory of 4972 1104 omsecor.exe 100 PID 4972 wrote to memory of 4308 4972 omsecor.exe 102 PID 4972 wrote to memory of 4308 4972 omsecor.exe 102 PID 4972 wrote to memory of 4308 4972 omsecor.exe 102 PID 4308 wrote to memory of 2296 4308 omsecor.exe 104 PID 4308 wrote to memory of 2296 4308 omsecor.exe 104 PID 4308 wrote to memory of 2296 4308 omsecor.exe 104 PID 4308 wrote to memory of 2296 4308 omsecor.exe 104 PID 4308 wrote to memory of 2296 4308 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe"C:\Users\Admin\AppData\Local\Temp\0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exeC:\Users\Admin\AppData\Local\Temp\0908ab18b8b4c3c0b071059969539f6bc26c8286abf54eb09f7ed054233681c3N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4308 -s 2568⤵
- Program crash
PID:2884
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 2926⤵
- Program crash
PID:3256
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 2924⤵
- Program crash
PID:3036
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 2922⤵
- Program crash
PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3240 -ip 32401⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2372 -ip 23721⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1104 -ip 11041⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4308 -ip 43081⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD503a03e36c88e90eb18996fc9f40a17d1
SHA115aaa29e4e390dbfbff9e1a7ba3b71828f14fa60
SHA25690a9e9b46f9cd558fd8dd144eb4b5f969b59a1f0a126dcc8227f25dec3f20d8a
SHA512a71c4752da43751654939f16f11f7ff57943e1029b7b71fb0b6f79c7ca9e53a1d5a8446ddc8e656bc3a5503ba44edd52346dbf1b5addbaf8cee25c4c6341122e
-
Filesize
96KB
MD598783b8896e7211b405713c846ff9e43
SHA1d709a4332d93471490a4eb4333fc23d93a426980
SHA256902f6eff421b5a212c4790888171e404b5622d8152899eff555f21a66a6002c4
SHA51233d02bcfabc7aa38acb1a9382085e2300666ebcfe6255e503b8c2a523f20d3b04375821ca60fa2759bb94d979275838fbbec21ec9f1c161193e73e9902c0884b
-
Filesize
96KB
MD5cf7e947a3ea6060772b8b39c5aeb6f87
SHA1dd1da3e6a376cd8c3539df98511950b884beb08c
SHA2568269f759b34c39a4e876afe895c70bd0216eeffb6ea936b03fda967247193f92
SHA5124ac5bce612d6fcf1760fc7a783c65a35475a0042e918ed8ac663571f83e16a973a1c80b38269d838df9656954a9287a2cfc0db4a044eeb38deb08f64c9501d64