Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 07:39
Static task
static1
Behavioral task
behavioral1
Sample
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe
Resource
win7-20240708-en
General
-
Target
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe
-
Size
96KB
-
MD5
2b2f1a8dcbdd5424b1c500e52c1ebd35
-
SHA1
42f0ea77ee3856290e1ea135265579eb72809ee9
-
SHA256
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f
-
SHA512
883254e887e1e9936d2e53f410c4ad26356c81acc97c6c4ac964c8fcdeb86a37e5a45a39446440096aaf01b619a6d99591278d3c894fd35874252fcfe0848869
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:TGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3460 omsecor.exe 1344 omsecor.exe 1044 omsecor.exe 3372 omsecor.exe 2616 omsecor.exe 2640 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3748 set thread context of 1068 3748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 3460 set thread context of 1344 3460 omsecor.exe 86 PID 1044 set thread context of 3372 1044 omsecor.exe 100 PID 2616 set thread context of 2640 2616 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4664 3748 WerFault.exe 81 2688 3460 WerFault.exe 85 8 1044 WerFault.exe 99 1228 2616 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3748 wrote to memory of 1068 3748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 3748 wrote to memory of 1068 3748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 3748 wrote to memory of 1068 3748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 3748 wrote to memory of 1068 3748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 3748 wrote to memory of 1068 3748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 1068 wrote to memory of 3460 1068 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 85 PID 1068 wrote to memory of 3460 1068 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 85 PID 1068 wrote to memory of 3460 1068 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 85 PID 3460 wrote to memory of 1344 3460 omsecor.exe 86 PID 3460 wrote to memory of 1344 3460 omsecor.exe 86 PID 3460 wrote to memory of 1344 3460 omsecor.exe 86 PID 3460 wrote to memory of 1344 3460 omsecor.exe 86 PID 3460 wrote to memory of 1344 3460 omsecor.exe 86 PID 1344 wrote to memory of 1044 1344 omsecor.exe 99 PID 1344 wrote to memory of 1044 1344 omsecor.exe 99 PID 1344 wrote to memory of 1044 1344 omsecor.exe 99 PID 1044 wrote to memory of 3372 1044 omsecor.exe 100 PID 1044 wrote to memory of 3372 1044 omsecor.exe 100 PID 1044 wrote to memory of 3372 1044 omsecor.exe 100 PID 1044 wrote to memory of 3372 1044 omsecor.exe 100 PID 1044 wrote to memory of 3372 1044 omsecor.exe 100 PID 3372 wrote to memory of 2616 3372 omsecor.exe 102 PID 3372 wrote to memory of 2616 3372 omsecor.exe 102 PID 3372 wrote to memory of 2616 3372 omsecor.exe 102 PID 2616 wrote to memory of 2640 2616 omsecor.exe 104 PID 2616 wrote to memory of 2640 2616 omsecor.exe 104 PID 2616 wrote to memory of 2640 2616 omsecor.exe 104 PID 2616 wrote to memory of 2640 2616 omsecor.exe 104 PID 2616 wrote to memory of 2640 2616 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe"C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exeC:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 2568⤵
- Program crash
PID:1228
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 2926⤵
- Program crash
PID:8
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 2884⤵
- Program crash
PID:2688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 2882⤵
- Program crash
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3748 -ip 37481⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3460 -ip 34601⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1044 -ip 10441⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2616 -ip 26161⤵PID:4208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5aa0bd952bbaf53fd0e0330968c44e6e7
SHA11b1c9de40d868547a61beaa2f4d924e43e74b62d
SHA256cc7d215f5abb854bd27fffd1043b1b8786ece7d0feb161c572c675e651249978
SHA512f254ab109fb68aff1d47d09a1b2af2818e1193c547fd463cd067c0c9caf8dd687b671043b59c6b157441e48e4c79f1063adf4f01bbe2e4e56946141724233692
-
Filesize
96KB
MD5f4989a14da464272f323b9fba28621b4
SHA1553fb924e83a6367b6b9c74a33c88956ea6e4d4b
SHA2563ad8bdab1d791cd4fd15bedab1d3353fb2fff6653417afcfea5a64a2d944326c
SHA512fb9cb80bdd70a34768966a94918f97d96fd1cddcb87719b214466b83fcc313e83e528595e4038a5252b819775639f5efd41ec1b1abf1aa7a65497b84bb5e55b0
-
Filesize
96KB
MD559e90131b6aa7b4dfa8093164da8ef71
SHA1813222d80930c37018f30e83440d7f333e4ebe5e
SHA256e36ec205a57b1c405bd30ca22b159fc1155077022a9759877cc455b9dd480c25
SHA512bb592cf9036fdcf75e91249f53d088cf44f34a6528b35d1e31d74c09d04a44015cb13b5f9e3de796ca213f95c7a824508e7702d25653370c7de0ac8f826f9536