Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe
Resource
win7-20240903-en
General
-
Target
02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe
-
Size
96KB
-
MD5
e4d210130cb796ea8140214c01d1f144
-
SHA1
1915311f004eccceacc1d1f5d711efe15bb2ce3f
-
SHA256
02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227
-
SHA512
956c2f23db35d87bb86ce9423634c4f2319394c1c5c5eaa2f0481391b012187997e52361e7e65c301d6cac779c265b68b1a9e2fd413b3a0e317e2f5150ae5d51
-
SSDEEP
1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:jGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4496 omsecor.exe 4980 omsecor.exe 4536 omsecor.exe 4340 omsecor.exe 4700 omsecor.exe 3060 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2000 set thread context of 776 2000 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 83 PID 4496 set thread context of 4980 4496 omsecor.exe 88 PID 4536 set thread context of 4340 4536 omsecor.exe 110 PID 4700 set thread context of 3060 4700 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 952 2000 WerFault.exe 82 1228 4496 WerFault.exe 86 1020 4536 WerFault.exe 109 4880 4700 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2000 wrote to memory of 776 2000 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 83 PID 2000 wrote to memory of 776 2000 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 83 PID 2000 wrote to memory of 776 2000 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 83 PID 2000 wrote to memory of 776 2000 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 83 PID 2000 wrote to memory of 776 2000 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 83 PID 776 wrote to memory of 4496 776 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 86 PID 776 wrote to memory of 4496 776 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 86 PID 776 wrote to memory of 4496 776 02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe 86 PID 4496 wrote to memory of 4980 4496 omsecor.exe 88 PID 4496 wrote to memory of 4980 4496 omsecor.exe 88 PID 4496 wrote to memory of 4980 4496 omsecor.exe 88 PID 4496 wrote to memory of 4980 4496 omsecor.exe 88 PID 4496 wrote to memory of 4980 4496 omsecor.exe 88 PID 4980 wrote to memory of 4536 4980 omsecor.exe 109 PID 4980 wrote to memory of 4536 4980 omsecor.exe 109 PID 4980 wrote to memory of 4536 4980 omsecor.exe 109 PID 4536 wrote to memory of 4340 4536 omsecor.exe 110 PID 4536 wrote to memory of 4340 4536 omsecor.exe 110 PID 4536 wrote to memory of 4340 4536 omsecor.exe 110 PID 4536 wrote to memory of 4340 4536 omsecor.exe 110 PID 4536 wrote to memory of 4340 4536 omsecor.exe 110 PID 4340 wrote to memory of 4700 4340 omsecor.exe 112 PID 4340 wrote to memory of 4700 4340 omsecor.exe 112 PID 4340 wrote to memory of 4700 4340 omsecor.exe 112 PID 4700 wrote to memory of 3060 4700 omsecor.exe 114 PID 4700 wrote to memory of 3060 4700 omsecor.exe 114 PID 4700 wrote to memory of 3060 4700 omsecor.exe 114 PID 4700 wrote to memory of 3060 4700 omsecor.exe 114 PID 4700 wrote to memory of 3060 4700 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe"C:\Users\Admin\AppData\Local\Temp\02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exeC:\Users\Admin\AppData\Local\Temp\02da2e998256c3d3112048fc9bca8e1a052587485d1d65c8c0b0a0c67813a227.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 2448⤵
- Program crash
PID:4880
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 2926⤵
- Program crash
PID:1020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 2924⤵
- Program crash
PID:1228
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 3002⤵
- Program crash
PID:952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2000 -ip 20001⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4496 -ip 44961⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4536 -ip 45361⤵PID:368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4700 -ip 47001⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59c4e5d6d7524395fe12044ccc2a66f8b
SHA1dad3d177e637099b8fb283b6172b83efe2f2fccc
SHA256de49c22cd0fb549c3d9958821eaaaf0b5047c3ebdee3b96f2c5a4e1d350580a8
SHA51288fd58e89ec6cc2c06230c7b04948c3fe1380cf79ed41020ae2da4beaa4fceff8c6053199cd4e60c727d8663502d0e3193c722237e5fc030dd9e41355f672103
-
Filesize
96KB
MD57c4df9e1c4d5640cb78bc827e5ead804
SHA1b23e3a609cd49a65ce44a9b93ef42499a462811a
SHA256a03b4220f8695a125671a7325116c0fff9a244f97ff5aec9d0bf8dfee2d14bda
SHA512aac7e46b33cd689a2184fb3f39236d9f7bbb763e00a4162e6944f3f124f83ffc5cb7fcd9748c6f5b2450d3dadb6a3ec97b63e1b28b79bc79dcea7a562b9a4bc1
-
Filesize
96KB
MD5fa85df067f83ac5870713b2487f69f1f
SHA18c00c1a3636d6ec5936cc73f04c9df497bec3718
SHA25606ea8231ad211bb9ad4ee70ffb352b8ab9cee5016f564cd241eb1e5f056ea25b
SHA5122adb60c7f08f6db1ea3addc806cf7e4978f4e2c5b85dd59c4312b1e62fe291a5ef5ece3ced1b888c0684bda5e82db2a1ece0cba0f7776abeea13e47a23e7c04c