Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe
Resource
win7-20240903-en
General
-
Target
b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe
-
Size
96KB
-
MD5
17f0de6dbf2844af1cf0c355ddab6552
-
SHA1
a6fb2c6b1b25345237a3e58ec9163224803d0ba4
-
SHA256
b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951
-
SHA512
7788b17e1ea8236fd5400db1cea4b367d2a8c5e5e54ab99e7669ac9f89fa2e002c353589971cc888a082470d3e8d753c441598c60895e2568be6c229a4f0d68d
-
SSDEEP
1536:anAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:aGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4288 omsecor.exe 4224 omsecor.exe 2000 omsecor.exe 1076 omsecor.exe 3496 omsecor.exe 112 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1876 set thread context of 3720 1876 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 83 PID 4288 set thread context of 4224 4288 omsecor.exe 87 PID 2000 set thread context of 1076 2000 omsecor.exe 108 PID 3496 set thread context of 112 3496 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 2144 1876 WerFault.exe 82 3988 4288 WerFault.exe 86 3308 2000 WerFault.exe 107 4360 3496 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1876 wrote to memory of 3720 1876 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 83 PID 1876 wrote to memory of 3720 1876 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 83 PID 1876 wrote to memory of 3720 1876 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 83 PID 1876 wrote to memory of 3720 1876 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 83 PID 1876 wrote to memory of 3720 1876 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 83 PID 3720 wrote to memory of 4288 3720 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 86 PID 3720 wrote to memory of 4288 3720 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 86 PID 3720 wrote to memory of 4288 3720 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 86 PID 4288 wrote to memory of 4224 4288 omsecor.exe 87 PID 4288 wrote to memory of 4224 4288 omsecor.exe 87 PID 4288 wrote to memory of 4224 4288 omsecor.exe 87 PID 4288 wrote to memory of 4224 4288 omsecor.exe 87 PID 4288 wrote to memory of 4224 4288 omsecor.exe 87 PID 4224 wrote to memory of 2000 4224 omsecor.exe 107 PID 4224 wrote to memory of 2000 4224 omsecor.exe 107 PID 4224 wrote to memory of 2000 4224 omsecor.exe 107 PID 2000 wrote to memory of 1076 2000 omsecor.exe 108 PID 2000 wrote to memory of 1076 2000 omsecor.exe 108 PID 2000 wrote to memory of 1076 2000 omsecor.exe 108 PID 2000 wrote to memory of 1076 2000 omsecor.exe 108 PID 2000 wrote to memory of 1076 2000 omsecor.exe 108 PID 1076 wrote to memory of 3496 1076 omsecor.exe 110 PID 1076 wrote to memory of 3496 1076 omsecor.exe 110 PID 1076 wrote to memory of 3496 1076 omsecor.exe 110 PID 3496 wrote to memory of 112 3496 omsecor.exe 112 PID 3496 wrote to memory of 112 3496 omsecor.exe 112 PID 3496 wrote to memory of 112 3496 omsecor.exe 112 PID 3496 wrote to memory of 112 3496 omsecor.exe 112 PID 3496 wrote to memory of 112 3496 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe"C:\Users\Admin\AppData\Local\Temp\b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exeC:\Users\Admin\AppData\Local\Temp\b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 2648⤵
- Program crash
PID:4360
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 2966⤵
- Program crash
PID:3308
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 3004⤵
- Program crash
PID:3988
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 2562⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1876 -ip 18761⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4288 -ip 42881⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2000 -ip 20001⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3496 -ip 34961⤵PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e24ab4b17274780ed3a9aa4580ef2b75
SHA1d29bd494f4a99b8028e4c43ff985b428e897a8b8
SHA256cfc9527a4c6ea94214baa2e0afffa50b48391b49f304e76210609b46173395e1
SHA5122c69c83ec3a8c3474a0080c068c597bb84c6d6ea6f5d7e5a5ec1143b21ab3ec9a4af6cc08bb7c1627eeb98bea269fc39b448702512c16ae701c93d6d5efd54dd
-
Filesize
96KB
MD5c83ddba5c2c33d99e260365e37e3820f
SHA1c4e45a1b5529bf3a9cf321ba1df841128d6640be
SHA256c050ba5b693195343f20f7136f5b733030b87db476a8090f2c84019b4aebab85
SHA512465aacdf2b26bed90c3f351270ddc7746e82ed24a34a34a74088ca05000660f339c21237142662439e7452a064adc3ca69d786d0abb649f49e9f399d7d4bcf49
-
Filesize
96KB
MD5f0d9347efd9d05d752c81cc012b81e2d
SHA162e88675809d7da7443b079fcc321690ed15a31d
SHA2563ead30b6353e1999b04ab90190a922c5b903ded1e6bec722f721a93150abc2b3
SHA512fc89def7662538ad10c8d001f36b78319f9a541044453a2e6fc374f095d0b6433f34fb7587528a894319ecb5c3ef84155e47dee1f6dcc63b1c45c09ea544b0ce