Analysis
-
max time kernel
115s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe
Resource
win7-20240903-en
General
-
Target
0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe
-
Size
96KB
-
MD5
be095d6a35f74016d38c678c56c1db7c
-
SHA1
737a8686c0a9931aba32241d56ec241ee57b65d6
-
SHA256
0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab
-
SHA512
75d2a3e581cf119ca9e33725c6ebc0e515b2f14e1a27d64d47ed7c4bec71b50cfb5587843dec40b938af8a562aa42eaa198a915cc22eabdbc84e68f9033d5a89
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:zGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4904 omsecor.exe 2672 omsecor.exe 524 omsecor.exe 4324 omsecor.exe 3804 omsecor.exe 2896 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2792 set thread context of 948 2792 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 84 PID 4904 set thread context of 2672 4904 omsecor.exe 88 PID 524 set thread context of 4324 524 omsecor.exe 110 PID 3804 set thread context of 2896 3804 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 3044 2792 WerFault.exe 83 1096 4904 WerFault.exe 87 2528 524 WerFault.exe 109 4676 3804 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2792 wrote to memory of 948 2792 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 84 PID 2792 wrote to memory of 948 2792 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 84 PID 2792 wrote to memory of 948 2792 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 84 PID 2792 wrote to memory of 948 2792 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 84 PID 2792 wrote to memory of 948 2792 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 84 PID 948 wrote to memory of 4904 948 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 87 PID 948 wrote to memory of 4904 948 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 87 PID 948 wrote to memory of 4904 948 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 87 PID 4904 wrote to memory of 2672 4904 omsecor.exe 88 PID 4904 wrote to memory of 2672 4904 omsecor.exe 88 PID 4904 wrote to memory of 2672 4904 omsecor.exe 88 PID 4904 wrote to memory of 2672 4904 omsecor.exe 88 PID 4904 wrote to memory of 2672 4904 omsecor.exe 88 PID 2672 wrote to memory of 524 2672 omsecor.exe 109 PID 2672 wrote to memory of 524 2672 omsecor.exe 109 PID 2672 wrote to memory of 524 2672 omsecor.exe 109 PID 524 wrote to memory of 4324 524 omsecor.exe 110 PID 524 wrote to memory of 4324 524 omsecor.exe 110 PID 524 wrote to memory of 4324 524 omsecor.exe 110 PID 524 wrote to memory of 4324 524 omsecor.exe 110 PID 524 wrote to memory of 4324 524 omsecor.exe 110 PID 4324 wrote to memory of 3804 4324 omsecor.exe 112 PID 4324 wrote to memory of 3804 4324 omsecor.exe 112 PID 4324 wrote to memory of 3804 4324 omsecor.exe 112 PID 3804 wrote to memory of 2896 3804 omsecor.exe 114 PID 3804 wrote to memory of 2896 3804 omsecor.exe 114 PID 3804 wrote to memory of 2896 3804 omsecor.exe 114 PID 3804 wrote to memory of 2896 3804 omsecor.exe 114 PID 3804 wrote to memory of 2896 3804 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe"C:\Users\Admin\AppData\Local\Temp\0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exeC:\Users\Admin\AppData\Local\Temp\0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 2688⤵
- Program crash
PID:4676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 2926⤵
- Program crash
PID:2528
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 2964⤵
- Program crash
PID:1096
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 2882⤵
- Program crash
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2792 -ip 27921⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4904 -ip 49041⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 524 -ip 5241⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3804 -ip 38041⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD568ffa9342d6525c2cc9b29ebe33d8b3c
SHA1d1aab119e807af549d4db5fffeecd68b8edba6d6
SHA256e6a4b4b29fc74d931afe1a1fee569e555169b6229487afc0a04a19382a630d1b
SHA512b29840852851b5da4012170132f269409ee61decb69a71bf73aa5800083624c567e15e938729b5450ad29fa1229f99e8142b5cab2cead3e32936266ded95ca6c
-
Filesize
96KB
MD58766871e47011bee6ec6dec3193741a0
SHA10fb04f25369575960bb634b776f42d4dc6d7914e
SHA256b61b3f7d095a87c9946218e78d00dd161da519a84ce22ccfabf6abe8cb56d996
SHA51268aa93db351cac8010d5dc2dbe79274ef092dbe7521afe21173e31b3515270407f13343f67502691275f25c29cb2782ce18c990bc96b7de52b2cadcee41fd909
-
Filesize
96KB
MD5eccb4e848f5b1b9ec6016af80a280352
SHA122d185631078198804d0d2245f2660dddec16d0d
SHA2560eeef49b01105bb910accb80b6a11a88edc57ee742befa16d93b9091104743f4
SHA5124f2e9872d6c08335b899fc73644889e632dcca34f5293a369d67ef97360856a2db8a3efa90bb3c1c1b4f95d9d73d7436b28b7a8562178d8be7420ccdbefa3dac