Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe
Resource
win7-20240708-en
General
-
Target
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe
-
Size
96KB
-
MD5
c5d27f97b4a50dc6a13f45a8ed2a9476
-
SHA1
dc06bb72c634658d7347009688980b841a8b4899
-
SHA256
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014
-
SHA512
653aabd8a7cf34d9c1f9861152b805d5bb5d2dff119dbb2edcff36784d71055ff4e33de19909e484b41cf96bb7e3b3158e9d9f6726cd923f5194cce4050cbf57
-
SSDEEP
1536:ZnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:ZGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3732 omsecor.exe 3120 omsecor.exe 1388 omsecor.exe 1944 omsecor.exe 4736 omsecor.exe 2144 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1348 set thread context of 876 1348 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 82 PID 3732 set thread context of 3120 3732 omsecor.exe 86 PID 1388 set thread context of 1944 1388 omsecor.exe 100 PID 4736 set thread context of 2144 4736 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4528 1348 WerFault.exe 81 4836 3732 WerFault.exe 85 4816 1388 WerFault.exe 99 744 4736 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1348 wrote to memory of 876 1348 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 82 PID 1348 wrote to memory of 876 1348 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 82 PID 1348 wrote to memory of 876 1348 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 82 PID 1348 wrote to memory of 876 1348 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 82 PID 1348 wrote to memory of 876 1348 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 82 PID 876 wrote to memory of 3732 876 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 85 PID 876 wrote to memory of 3732 876 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 85 PID 876 wrote to memory of 3732 876 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 85 PID 3732 wrote to memory of 3120 3732 omsecor.exe 86 PID 3732 wrote to memory of 3120 3732 omsecor.exe 86 PID 3732 wrote to memory of 3120 3732 omsecor.exe 86 PID 3732 wrote to memory of 3120 3732 omsecor.exe 86 PID 3732 wrote to memory of 3120 3732 omsecor.exe 86 PID 3120 wrote to memory of 1388 3120 omsecor.exe 99 PID 3120 wrote to memory of 1388 3120 omsecor.exe 99 PID 3120 wrote to memory of 1388 3120 omsecor.exe 99 PID 1388 wrote to memory of 1944 1388 omsecor.exe 100 PID 1388 wrote to memory of 1944 1388 omsecor.exe 100 PID 1388 wrote to memory of 1944 1388 omsecor.exe 100 PID 1388 wrote to memory of 1944 1388 omsecor.exe 100 PID 1388 wrote to memory of 1944 1388 omsecor.exe 100 PID 1944 wrote to memory of 4736 1944 omsecor.exe 102 PID 1944 wrote to memory of 4736 1944 omsecor.exe 102 PID 1944 wrote to memory of 4736 1944 omsecor.exe 102 PID 4736 wrote to memory of 2144 4736 omsecor.exe 104 PID 4736 wrote to memory of 2144 4736 omsecor.exe 104 PID 4736 wrote to memory of 2144 4736 omsecor.exe 104 PID 4736 wrote to memory of 2144 4736 omsecor.exe 104 PID 4736 wrote to memory of 2144 4736 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe"C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exeC:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 2568⤵
- Program crash
PID:744
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 2926⤵
- Program crash
PID:4816
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 3004⤵
- Program crash
PID:4836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 2882⤵
- Program crash
PID:4528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1348 -ip 13481⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3732 -ip 37321⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1388 -ip 13881⤵PID:2676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4736 -ip 47361⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59e7bacc8a06035834c6d77d39a1f9323
SHA1612ee8fdaaa8e67a5bf4c8b0a54e28b558ed7093
SHA256619f8148adb44214a4b73aebcd7328b6daadc9ebf1cc69b9cc119c7a9e1f4027
SHA51264dbfa76ca855f24bfbd6d69b3ab1001487b4e4b496ac05de29b75471acccd2617608b48e4af97e344870fb1df32d1e0154209b9aed351db340c35b35df26e73
-
Filesize
96KB
MD576a463c29386e5e016674ab429d6ab87
SHA1fafc3605f3e8cde84f86429063fd2c242b744b6e
SHA2569a9e4e81ec8b36ce09cb5595d78a45af9c5dfec692348a8918f6f48285a7f1bc
SHA5127528f2143a37f83e399a0a41d5f09a0f4c866d78ef2ee8d3a2fb642497caddd663b89766e69696e07f4fd6dc44a5d85b537a70472a17bbd8e0ade856173b31d9
-
Filesize
96KB
MD5805227500fb418a934e10c411d378d35
SHA1ed732725aaa63a3de1c2350c8c28959e770555cf
SHA256d95b6a3b73eea9a3443ae39d967e524927086619b9ea336c66492670c6493223
SHA51272a9a24935ad79d9fa3bbee312684548c0b1513f42930fa71e306a8b60c11a4c9f56ea9493f7eb5339bc5e2cc32d483236e99750735678339c30249c849c143b