Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe
Resource
win7-20240903-en
General
-
Target
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe
-
Size
96KB
-
MD5
368d064efacaaa20abc57a01c83e0f3e
-
SHA1
2f0a36ebc6e185071605afa653ad3da504d4df62
-
SHA256
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e
-
SHA512
641a4ac039b2cb409b615069c1874a004e0f0da2e4a69937bd176a089c12b1960597afb12bb10b0f218ecc126cf85ad53a5ae4f099844ab316e3d43c20f172c9
-
SSDEEP
1536:+nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:+Gs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3828 omsecor.exe 692 omsecor.exe 4220 omsecor.exe 2812 omsecor.exe 2696 omsecor.exe 2116 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2036 set thread context of 3964 2036 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 3828 set thread context of 692 3828 omsecor.exe 88 PID 4220 set thread context of 2812 4220 omsecor.exe 107 PID 2696 set thread context of 2116 2696 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 5068 2036 WerFault.exe 82 536 3828 WerFault.exe 86 1240 4220 WerFault.exe 106 4036 2696 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3964 2036 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2036 wrote to memory of 3964 2036 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2036 wrote to memory of 3964 2036 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2036 wrote to memory of 3964 2036 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2036 wrote to memory of 3964 2036 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 3964 wrote to memory of 3828 3964 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 86 PID 3964 wrote to memory of 3828 3964 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 86 PID 3964 wrote to memory of 3828 3964 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 86 PID 3828 wrote to memory of 692 3828 omsecor.exe 88 PID 3828 wrote to memory of 692 3828 omsecor.exe 88 PID 3828 wrote to memory of 692 3828 omsecor.exe 88 PID 3828 wrote to memory of 692 3828 omsecor.exe 88 PID 3828 wrote to memory of 692 3828 omsecor.exe 88 PID 692 wrote to memory of 4220 692 omsecor.exe 106 PID 692 wrote to memory of 4220 692 omsecor.exe 106 PID 692 wrote to memory of 4220 692 omsecor.exe 106 PID 4220 wrote to memory of 2812 4220 omsecor.exe 107 PID 4220 wrote to memory of 2812 4220 omsecor.exe 107 PID 4220 wrote to memory of 2812 4220 omsecor.exe 107 PID 4220 wrote to memory of 2812 4220 omsecor.exe 107 PID 4220 wrote to memory of 2812 4220 omsecor.exe 107 PID 2812 wrote to memory of 2696 2812 omsecor.exe 109 PID 2812 wrote to memory of 2696 2812 omsecor.exe 109 PID 2812 wrote to memory of 2696 2812 omsecor.exe 109 PID 2696 wrote to memory of 2116 2696 omsecor.exe 111 PID 2696 wrote to memory of 2116 2696 omsecor.exe 111 PID 2696 wrote to memory of 2116 2696 omsecor.exe 111 PID 2696 wrote to memory of 2116 2696 omsecor.exe 111 PID 2696 wrote to memory of 2116 2696 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe"C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exeC:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 2568⤵
- Program crash
PID:4036
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4220 -s 2926⤵
- Program crash
PID:1240
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 2884⤵
- Program crash
PID:536
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 2882⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2036 -ip 20361⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3828 -ip 38281⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4220 -ip 42201⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2696 -ip 26961⤵PID:668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5bf7081c5fb72643cae63538b0128b8b8
SHA1ac3e5ac8e5d58b60740da52458b17c762cd17024
SHA25644ac5aa265f57cf9df83355e6ba0f6dc64f91351229b6ebba9946c514b07347f
SHA5124653a7c3f8c03681f38a52e6bd7c46b2f68b700382e95218e04579f22087ef6473b3cc1c0cef7837fcc3410c9278a5875cafc9867dbfadc9fdd58eda1d4b5711
-
Filesize
96KB
MD5ddaa1049dc02d0b91a0f2dcbad07f972
SHA18b26c808b7ac1450c3282caadde0d2aa7b76a19a
SHA256291ae9ca21081533e6e4cf8e73fe735ec9a044c088c6c854ccc89259f0a657de
SHA5122119eeedb6addb9d4b509c3f898e9fc167b26bdc8bb3df7bf6a5b32ad31b1b73621af520a66fba300af10ad9843750efd2e7e28361d3f0201ebf769bc2c6b936
-
Filesize
96KB
MD505e3589590be000129dc68169d9a423c
SHA1901016c60a76a4034c7f336b5b75a59b6144de4a
SHA256cc5e4badabc2fafe045ce05572ea4e7c933eea8101eafc1fdd80316a4b7413bc
SHA51223b38b759dabe541d63b49dd3284f714afc5a8c8e4d5333345f8638b5e0ef976f4f3e52c2effaa8adc2838d91c563d7ec40b8484a41be67c44e5bf390ad591ce