Analysis
-
max time kernel
120s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe
Resource
win7-20240903-en
General
-
Target
b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe
-
Size
96KB
-
MD5
4c3bb51b742d063506cd6400a4601577
-
SHA1
24186ae58bc65217faba05eeaa80db7d998a3fcf
-
SHA256
b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd
-
SHA512
3dc054d0748900a50d7a810404e0ed7fab852428483bd98acda79b373171592deec1804bd26526da11d9d587f8e4d5049f286ba45b9de8c9273362eb28f942e9
-
SSDEEP
1536:CnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxT:CGs8cd8eXlYairZYqMddH13T
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3976 omsecor.exe 2192 omsecor.exe 1752 omsecor.exe 2528 omsecor.exe 2172 omsecor.exe 4604 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3180 set thread context of 3424 3180 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 85 PID 3976 set thread context of 2192 3976 omsecor.exe 89 PID 1752 set thread context of 2528 1752 omsecor.exe 112 PID 2172 set thread context of 4604 2172 omsecor.exe 116 -
Program crash 4 IoCs
pid pid_target Process procid_target 4268 3180 WerFault.exe 84 2876 3976 WerFault.exe 87 2696 1752 WerFault.exe 111 4184 2172 WerFault.exe 114 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3424 3180 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 85 PID 3180 wrote to memory of 3424 3180 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 85 PID 3180 wrote to memory of 3424 3180 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 85 PID 3180 wrote to memory of 3424 3180 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 85 PID 3180 wrote to memory of 3424 3180 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 85 PID 3424 wrote to memory of 3976 3424 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 87 PID 3424 wrote to memory of 3976 3424 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 87 PID 3424 wrote to memory of 3976 3424 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 87 PID 3976 wrote to memory of 2192 3976 omsecor.exe 89 PID 3976 wrote to memory of 2192 3976 omsecor.exe 89 PID 3976 wrote to memory of 2192 3976 omsecor.exe 89 PID 3976 wrote to memory of 2192 3976 omsecor.exe 89 PID 3976 wrote to memory of 2192 3976 omsecor.exe 89 PID 2192 wrote to memory of 1752 2192 omsecor.exe 111 PID 2192 wrote to memory of 1752 2192 omsecor.exe 111 PID 2192 wrote to memory of 1752 2192 omsecor.exe 111 PID 1752 wrote to memory of 2528 1752 omsecor.exe 112 PID 1752 wrote to memory of 2528 1752 omsecor.exe 112 PID 1752 wrote to memory of 2528 1752 omsecor.exe 112 PID 1752 wrote to memory of 2528 1752 omsecor.exe 112 PID 1752 wrote to memory of 2528 1752 omsecor.exe 112 PID 2528 wrote to memory of 2172 2528 omsecor.exe 114 PID 2528 wrote to memory of 2172 2528 omsecor.exe 114 PID 2528 wrote to memory of 2172 2528 omsecor.exe 114 PID 2172 wrote to memory of 4604 2172 omsecor.exe 116 PID 2172 wrote to memory of 4604 2172 omsecor.exe 116 PID 2172 wrote to memory of 4604 2172 omsecor.exe 116 PID 2172 wrote to memory of 4604 2172 omsecor.exe 116 PID 2172 wrote to memory of 4604 2172 omsecor.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe"C:\Users\Admin\AppData\Local\Temp\b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exeC:\Users\Admin\AppData\Local\Temp\b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 2568⤵
- Program crash
PID:4184
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 2926⤵
- Program crash
PID:2696
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 3004⤵
- Program crash
PID:2876
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 2882⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3180 -ip 31801⤵PID:4008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3976 -ip 39761⤵PID:2556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1752 -ip 17521⤵PID:244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2172 -ip 21721⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5efddb68d7b2a9b9c1c443a8566aae571
SHA1dec1f6bbfa441656e0e9d1871ec6d9a2dc6d50a7
SHA256fae9e7da79b81ff53487ddb171e5af959c46ec782e36f2cf168bb482959d73f8
SHA5129e9f36983e3f10df29f77e3f4f31e8f6f4f368fdfbfaecb519dc0c7b00fd625ded420c7d2beea48bbe06e5e4b5b34645f5173ab903f52effcaf2161f40cdaf3d
-
Filesize
96KB
MD5fada79126d1caec75100d30e9e9a0c80
SHA1f9df9d359fb576cd36e6d4a52b0c38ee590a0c94
SHA25669c796a6f6dbeb067ee92705a2a76280857feb91d5594d9d4ec0d228e03cbf93
SHA512df4db013140b17fe15ac0349e41d77e8cb8faea241d8f7b3c2c0807cbc8f62b6be464c3c36804a86d55dbbf8fe7fbf63e479dca5a35ea21f72b3d02a59ce0fe2
-
Filesize
96KB
MD5e508c3c5142bd8ce8da4c1fd99120367
SHA1eca7dcf7b7561c4a5ccb3b79cfe025bf59b35296
SHA256f74284ea96090e7192051bd97426033e8fc571e45ed0b702440153f31f66821a
SHA5129410f99e278f9fcb8c55933ec3daa017382d46d800f7877433812bdb8a3a8c9ce0dfa78e48bc3a7f3befed1fa89836673b55a361f44ab71ba9eebec4b525e1fa