Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe
Resource
win7-20240903-en
General
-
Target
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe
-
Size
96KB
-
MD5
368d064efacaaa20abc57a01c83e0f3e
-
SHA1
2f0a36ebc6e185071605afa653ad3da504d4df62
-
SHA256
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e
-
SHA512
641a4ac039b2cb409b615069c1874a004e0f0da2e4a69937bd176a089c12b1960597afb12bb10b0f218ecc126cf85ad53a5ae4f099844ab316e3d43c20f172c9
-
SSDEEP
1536:+nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:+Gs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2852 omsecor.exe 4424 omsecor.exe 4896 omsecor.exe 4900 omsecor.exe 2184 omsecor.exe 4676 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2360 set thread context of 1344 2360 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2852 set thread context of 4424 2852 omsecor.exe 88 PID 4896 set thread context of 4900 4896 omsecor.exe 107 PID 2184 set thread context of 4676 2184 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 4964 2360 WerFault.exe 82 4912 2852 WerFault.exe 85 1544 4896 WerFault.exe 106 2108 2184 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1344 2360 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2360 wrote to memory of 1344 2360 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2360 wrote to memory of 1344 2360 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2360 wrote to memory of 1344 2360 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 2360 wrote to memory of 1344 2360 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 83 PID 1344 wrote to memory of 2852 1344 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 85 PID 1344 wrote to memory of 2852 1344 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 85 PID 1344 wrote to memory of 2852 1344 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 85 PID 2852 wrote to memory of 4424 2852 omsecor.exe 88 PID 2852 wrote to memory of 4424 2852 omsecor.exe 88 PID 2852 wrote to memory of 4424 2852 omsecor.exe 88 PID 2852 wrote to memory of 4424 2852 omsecor.exe 88 PID 2852 wrote to memory of 4424 2852 omsecor.exe 88 PID 4424 wrote to memory of 4896 4424 omsecor.exe 106 PID 4424 wrote to memory of 4896 4424 omsecor.exe 106 PID 4424 wrote to memory of 4896 4424 omsecor.exe 106 PID 4896 wrote to memory of 4900 4896 omsecor.exe 107 PID 4896 wrote to memory of 4900 4896 omsecor.exe 107 PID 4896 wrote to memory of 4900 4896 omsecor.exe 107 PID 4896 wrote to memory of 4900 4896 omsecor.exe 107 PID 4896 wrote to memory of 4900 4896 omsecor.exe 107 PID 4900 wrote to memory of 2184 4900 omsecor.exe 109 PID 4900 wrote to memory of 2184 4900 omsecor.exe 109 PID 4900 wrote to memory of 2184 4900 omsecor.exe 109 PID 2184 wrote to memory of 4676 2184 omsecor.exe 111 PID 2184 wrote to memory of 4676 2184 omsecor.exe 111 PID 2184 wrote to memory of 4676 2184 omsecor.exe 111 PID 2184 wrote to memory of 4676 2184 omsecor.exe 111 PID 2184 wrote to memory of 4676 2184 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe"C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exeC:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 2568⤵
- Program crash
PID:2108
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 2926⤵
- Program crash
PID:1544
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 2884⤵
- Program crash
PID:4912
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 2882⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2360 -ip 23601⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2852 -ip 28521⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4896 -ip 48961⤵PID:4764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2184 -ip 21841⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a0b9bdcaf456f6ae73f7f446e96ffe04
SHA18fa9a6b419d06c43b203dbdd5a16e9dce972cc7f
SHA2561d33d02a8e0a74cf87abc69d4653bdef51053d233bcbbbc127f12c8bb0fc6135
SHA5122f0c716aece0e7f4d609e97a9bf3210d7ef483505a7f9bc4c9af18bb86fd990a6203d8d329261d66411b207ac07eec9b8ebdaeac36e995e209f89c850578bd8b
-
Filesize
96KB
MD5bf7081c5fb72643cae63538b0128b8b8
SHA1ac3e5ac8e5d58b60740da52458b17c762cd17024
SHA25644ac5aa265f57cf9df83355e6ba0f6dc64f91351229b6ebba9946c514b07347f
SHA5124653a7c3f8c03681f38a52e6bd7c46b2f68b700382e95218e04579f22087ef6473b3cc1c0cef7837fcc3410c9278a5875cafc9867dbfadc9fdd58eda1d4b5711
-
Filesize
96KB
MD50900f4d56d7c89eb744556c3a18f322b
SHA17ac81d0994384adc6e7b0d9c3a55c2809d4ab28d
SHA256f81b865468c91a0df3d8688e3eac97dd49dbe76911c86a4be5c1fea58b6a8849
SHA51229c900654796371206e44868d19eed83fceffb2411f746ef1225efc47311f3338ba7d6d85898b962935d35f0c720b247b9c04d858d2db8d4bfa7e26f09f804a9