Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe
Resource
win7-20240903-en
General
-
Target
f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe
-
Size
96KB
-
MD5
d1fb484be032bf88d1ef0bc194c69c51
-
SHA1
e1f932d917d0f5597a270a1b9fedd81d6b7e0d7e
-
SHA256
f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a
-
SHA512
f78b60fef01b290a43708cc842bb48ce2cd4f55c473933f64de1db5af3bf3cd69313379a47966257ed90214ec713c1f89e3a785214403fd3c9abd9d0118da5f4
-
SSDEEP
1536:NnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:NGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3420 omsecor.exe 224 omsecor.exe 3656 omsecor.exe 4032 omsecor.exe 4352 omsecor.exe 2780 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2380 set thread context of 3572 2380 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 83 PID 3420 set thread context of 224 3420 omsecor.exe 88 PID 3656 set thread context of 4032 3656 omsecor.exe 108 PID 4352 set thread context of 2780 4352 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 2228 2380 WerFault.exe 82 1440 3420 WerFault.exe 85 2128 3656 WerFault.exe 107 2384 4352 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3572 2380 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 83 PID 2380 wrote to memory of 3572 2380 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 83 PID 2380 wrote to memory of 3572 2380 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 83 PID 2380 wrote to memory of 3572 2380 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 83 PID 2380 wrote to memory of 3572 2380 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 83 PID 3572 wrote to memory of 3420 3572 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 85 PID 3572 wrote to memory of 3420 3572 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 85 PID 3572 wrote to memory of 3420 3572 f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe 85 PID 3420 wrote to memory of 224 3420 omsecor.exe 88 PID 3420 wrote to memory of 224 3420 omsecor.exe 88 PID 3420 wrote to memory of 224 3420 omsecor.exe 88 PID 3420 wrote to memory of 224 3420 omsecor.exe 88 PID 3420 wrote to memory of 224 3420 omsecor.exe 88 PID 224 wrote to memory of 3656 224 omsecor.exe 107 PID 224 wrote to memory of 3656 224 omsecor.exe 107 PID 224 wrote to memory of 3656 224 omsecor.exe 107 PID 3656 wrote to memory of 4032 3656 omsecor.exe 108 PID 3656 wrote to memory of 4032 3656 omsecor.exe 108 PID 3656 wrote to memory of 4032 3656 omsecor.exe 108 PID 3656 wrote to memory of 4032 3656 omsecor.exe 108 PID 3656 wrote to memory of 4032 3656 omsecor.exe 108 PID 4032 wrote to memory of 4352 4032 omsecor.exe 110 PID 4032 wrote to memory of 4352 4032 omsecor.exe 110 PID 4032 wrote to memory of 4352 4032 omsecor.exe 110 PID 4352 wrote to memory of 2780 4352 omsecor.exe 112 PID 4352 wrote to memory of 2780 4352 omsecor.exe 112 PID 4352 wrote to memory of 2780 4352 omsecor.exe 112 PID 4352 wrote to memory of 2780 4352 omsecor.exe 112 PID 4352 wrote to memory of 2780 4352 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe"C:\Users\Admin\AppData\Local\Temp\f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exeC:\Users\Admin\AppData\Local\Temp\f92138b1c6726541ac127925284096f2285609faf68a91fe37eea53fd3218c3a.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 2688⤵
- Program crash
PID:2384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 2926⤵
- Program crash
PID:2128
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 2884⤵
- Program crash
PID:1440
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 2882⤵
- Program crash
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2380 -ip 23801⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3420 -ip 34201⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3656 -ip 36561⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4352 -ip 43521⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5638e282f3ec982c7dcf2936d1f57aeb0
SHA1c964a74d57c0f3cb85d10b6898a7147711535164
SHA2566fe6de960e29a28827cb6ef2e945c453e467da222a1dfa2726b6761f2a435eec
SHA5124048297b2efa1ab950893df8191df97103f14b9773a459d3e3691a299db940e57ef8a2358d7eca25a48c756fc60de48d1f46d66d4f8d007bbab00764a59a3391
-
Filesize
96KB
MD5bc2dc235c91f87ff194c3174214cdc4f
SHA1dc7fc4919f887151164b70dd9651c4d4e187eaf9
SHA256261b66971358b5ca786c4a651ad906fc9e7dae13530bdda49332da6239456cae
SHA5127ce9d26ef3afdff28e9d6b4b3e858ae6e7928e22ab6416c69f478fe695b652e4dc8e4d72a53560a74a5ef0f5d58ea672d264ef76ea66da334cc95e0d115b2f2f
-
Filesize
96KB
MD50afe4df1c905c7a3851a2171ebd090ef
SHA15423c42bdc06326015ee317716db1e57731f69ac
SHA25600268bc54643235748077f5625186976228a21c0faee08eb2fd69098a95e00c6
SHA512ad8743744464c5382589f3a2c347f836ef7529443794d3a54b9f973602b221428cf8443fd6aea8994ee2ce1a28ee7a5442559d33cbab4742c15baa7a24af485e