Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe
Resource
win7-20240903-en
General
-
Target
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe
-
Size
96KB
-
MD5
2b2f1a8dcbdd5424b1c500e52c1ebd35
-
SHA1
42f0ea77ee3856290e1ea135265579eb72809ee9
-
SHA256
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f
-
SHA512
883254e887e1e9936d2e53f410c4ad26356c81acc97c6c4ac964c8fcdeb86a37e5a45a39446440096aaf01b619a6d99591278d3c894fd35874252fcfe0848869
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:TGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 448 omsecor.exe 4004 omsecor.exe 3416 omsecor.exe 884 omsecor.exe 2256 omsecor.exe 4524 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4876 set thread context of 1748 4876 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 448 set thread context of 4004 448 omsecor.exe 86 PID 3416 set thread context of 884 3416 omsecor.exe 100 PID 2256 set thread context of 4524 2256 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4208 4876 WerFault.exe 81 5032 448 WerFault.exe 84 2596 3416 WerFault.exe 99 2552 2256 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4876 wrote to memory of 1748 4876 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 4876 wrote to memory of 1748 4876 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 4876 wrote to memory of 1748 4876 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 4876 wrote to memory of 1748 4876 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 4876 wrote to memory of 1748 4876 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 82 PID 1748 wrote to memory of 448 1748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 84 PID 1748 wrote to memory of 448 1748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 84 PID 1748 wrote to memory of 448 1748 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 84 PID 448 wrote to memory of 4004 448 omsecor.exe 86 PID 448 wrote to memory of 4004 448 omsecor.exe 86 PID 448 wrote to memory of 4004 448 omsecor.exe 86 PID 448 wrote to memory of 4004 448 omsecor.exe 86 PID 448 wrote to memory of 4004 448 omsecor.exe 86 PID 4004 wrote to memory of 3416 4004 omsecor.exe 99 PID 4004 wrote to memory of 3416 4004 omsecor.exe 99 PID 4004 wrote to memory of 3416 4004 omsecor.exe 99 PID 3416 wrote to memory of 884 3416 omsecor.exe 100 PID 3416 wrote to memory of 884 3416 omsecor.exe 100 PID 3416 wrote to memory of 884 3416 omsecor.exe 100 PID 3416 wrote to memory of 884 3416 omsecor.exe 100 PID 3416 wrote to memory of 884 3416 omsecor.exe 100 PID 884 wrote to memory of 2256 884 omsecor.exe 102 PID 884 wrote to memory of 2256 884 omsecor.exe 102 PID 884 wrote to memory of 2256 884 omsecor.exe 102 PID 2256 wrote to memory of 4524 2256 omsecor.exe 104 PID 2256 wrote to memory of 4524 2256 omsecor.exe 104 PID 2256 wrote to memory of 4524 2256 omsecor.exe 104 PID 2256 wrote to memory of 4524 2256 omsecor.exe 104 PID 2256 wrote to memory of 4524 2256 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe"C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exeC:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 2568⤵
- Program crash
PID:2552
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 2926⤵
- Program crash
PID:2596
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 2884⤵
- Program crash
PID:5032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 2882⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4876 -ip 48761⤵PID:3580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 448 -ip 4481⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3416 -ip 34161⤵PID:668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2256 -ip 22561⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e0ec7ece24ada5cf28b50164b1cecf9d
SHA1230a92e6864bb46dec26361c6b53e58a99c9ff00
SHA256600db9e753104057f9ad76c1a30de7535c1ac57c3ee40313d6264ca2070c9a53
SHA5122726a408066413254cd7ba8f32925b6d02c0ceb653fb26e3d664758e03e58a57ac05ace30289715b52e936c3f81aecc9bef3750208b22203a5122add3898b8d6
-
Filesize
96KB
MD5f4989a14da464272f323b9fba28621b4
SHA1553fb924e83a6367b6b9c74a33c88956ea6e4d4b
SHA2563ad8bdab1d791cd4fd15bedab1d3353fb2fff6653417afcfea5a64a2d944326c
SHA512fb9cb80bdd70a34768966a94918f97d96fd1cddcb87719b214466b83fcc313e83e528595e4038a5252b819775639f5efd41ec1b1abf1aa7a65497b84bb5e55b0
-
Filesize
96KB
MD5690feb0cf3d940a9be1a319c94ad995e
SHA11cef7797fd2d3585e8fd79017de684b1bfbd362f
SHA2560757f144a606761c966edfb4e778d6020b40924ddb4edbf19eec9ff2677819df
SHA51208f9788fafec5f1bc307068d308cc578b498eb800591e6f15f0d0423da7b2aa6251e0a708780b3fd6cca7bf9d713fcbb8c80d7dc9f1f3eec9ade0ab5114ba695