Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe
Resource
win7-20240903-en
General
-
Target
15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe
-
Size
96KB
-
MD5
908bcf3c4fadd2ae2629523879d59250
-
SHA1
9fc9f54fc234dc2d4fc69165c3bf50623f0aae73
-
SHA256
15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0
-
SHA512
80582a387d6b3bf1346189d847ec85cabef6d854f2cc138eb0e49b530db2508d5972d1deedbb718f16a4041d23240e1f1e7b0d51cc420f8d9026816f37168154
-
SSDEEP
1536:ZnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:ZGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 5080 omsecor.exe 3584 omsecor.exe 1584 omsecor.exe 3612 omsecor.exe 2372 omsecor.exe 5096 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4532 set thread context of 4672 4532 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 82 PID 5080 set thread context of 3584 5080 omsecor.exe 87 PID 1584 set thread context of 3612 1584 omsecor.exe 100 PID 2372 set thread context of 5096 2372 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3816 4532 WerFault.exe 81 4640 5080 WerFault.exe 84 4292 1584 WerFault.exe 99 4840 2372 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4672 4532 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 82 PID 4532 wrote to memory of 4672 4532 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 82 PID 4532 wrote to memory of 4672 4532 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 82 PID 4532 wrote to memory of 4672 4532 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 82 PID 4532 wrote to memory of 4672 4532 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 82 PID 4672 wrote to memory of 5080 4672 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 84 PID 4672 wrote to memory of 5080 4672 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 84 PID 4672 wrote to memory of 5080 4672 15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe 84 PID 5080 wrote to memory of 3584 5080 omsecor.exe 87 PID 5080 wrote to memory of 3584 5080 omsecor.exe 87 PID 5080 wrote to memory of 3584 5080 omsecor.exe 87 PID 5080 wrote to memory of 3584 5080 omsecor.exe 87 PID 5080 wrote to memory of 3584 5080 omsecor.exe 87 PID 3584 wrote to memory of 1584 3584 omsecor.exe 99 PID 3584 wrote to memory of 1584 3584 omsecor.exe 99 PID 3584 wrote to memory of 1584 3584 omsecor.exe 99 PID 1584 wrote to memory of 3612 1584 omsecor.exe 100 PID 1584 wrote to memory of 3612 1584 omsecor.exe 100 PID 1584 wrote to memory of 3612 1584 omsecor.exe 100 PID 1584 wrote to memory of 3612 1584 omsecor.exe 100 PID 1584 wrote to memory of 3612 1584 omsecor.exe 100 PID 3612 wrote to memory of 2372 3612 omsecor.exe 102 PID 3612 wrote to memory of 2372 3612 omsecor.exe 102 PID 3612 wrote to memory of 2372 3612 omsecor.exe 102 PID 2372 wrote to memory of 5096 2372 omsecor.exe 104 PID 2372 wrote to memory of 5096 2372 omsecor.exe 104 PID 2372 wrote to memory of 5096 2372 omsecor.exe 104 PID 2372 wrote to memory of 5096 2372 omsecor.exe 104 PID 2372 wrote to memory of 5096 2372 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe"C:\Users\Admin\AppData\Local\Temp\15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exeC:\Users\Admin\AppData\Local\Temp\15d61bf8d6a1ea48198ee726610e25263a290aa35721adb5b46e60a713f0a3f0N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 2568⤵
- Program crash
PID:4840
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 2926⤵
- Program crash
PID:4292
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 2964⤵
- Program crash
PID:4640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 2522⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4532 -ip 45321⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5080 -ip 50801⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1584 -ip 15841⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2372 -ip 23721⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54b111b9abec0a18055314edd3b3af847
SHA1dff2cdb25fa292109995e6f31d4372235e867b48
SHA256ad759b9f7adce565b71132cbc1ffd74ec58002164df77c20d7b52c3ebb5e36bc
SHA512168727473b122eececfd499ef9200dbae2857d50c62a3fcc54812ee293debb1ea8b031c3ab83f3f8706988018b596c145e0b2599403b39499e7fb2fbf3bf8c19
-
Filesize
96KB
MD534849c9bb38d85136fc8e449ebb7756c
SHA1fc00718187c51b392a53186e55aa40dc56e5cba0
SHA256ea6a9d9ddd0ef47bc6ff0a92d724f728a40cac37930e559b133abb0c7396ef31
SHA51245b97ae5a6caab31fb1ae3f7b8e72385e080a1304a175ea5a8fcb21ac9e742dc2627a56c64e8c690a7a96f623bdb8cb5e99c32d900544b334f9ea68b295c3351
-
Filesize
96KB
MD57072bb09548b910acd8d3743ac69a6e1
SHA15c2f6d4be1f27aea761fd21548950db2abdecfd1
SHA256525300fe8bdc8da04d95fd6415a1d029e17fd1c64539bfdbe54e4f7d8286997c
SHA512b1d0cff3fdd0a9678849986941ef23e5fb4e84c115a2476d27483d57f9b6b52ca4f2f0a4afbe244296df87d9f0d42e0a7ca17f47cfeb6be8ce81021b9f01959f