Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
Resource
win7-20240903-en
General
-
Target
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
-
Size
96KB
-
MD5
809d8bedb2da450b588bf82e9a118fe4
-
SHA1
5cb2c9863ddc2ba5346967bf0780554c8dc120f9
-
SHA256
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72
-
SHA512
4768075e7c02683f09e9d23339b5a69724c3439c711244c7761f9ceaf44f7c4a6d8b1189ab47214e4aa4a27e1fad1f07b4be4d3d374c87326611fc68be378287
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:hGs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 736 omsecor.exe 4544 omsecor.exe 3368 omsecor.exe 4376 omsecor.exe 796 omsecor.exe 4632 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2636 set thread context of 3180 2636 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 83 PID 736 set thread context of 4544 736 omsecor.exe 87 PID 3368 set thread context of 4376 3368 omsecor.exe 107 PID 796 set thread context of 4632 796 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 1224 2636 WerFault.exe 82 4836 736 WerFault.exe 86 2340 3368 WerFault.exe 106 2932 796 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2636 wrote to memory of 3180 2636 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 83 PID 2636 wrote to memory of 3180 2636 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 83 PID 2636 wrote to memory of 3180 2636 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 83 PID 2636 wrote to memory of 3180 2636 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 83 PID 2636 wrote to memory of 3180 2636 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 83 PID 3180 wrote to memory of 736 3180 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 86 PID 3180 wrote to memory of 736 3180 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 86 PID 3180 wrote to memory of 736 3180 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 86 PID 736 wrote to memory of 4544 736 omsecor.exe 87 PID 736 wrote to memory of 4544 736 omsecor.exe 87 PID 736 wrote to memory of 4544 736 omsecor.exe 87 PID 736 wrote to memory of 4544 736 omsecor.exe 87 PID 736 wrote to memory of 4544 736 omsecor.exe 87 PID 4544 wrote to memory of 3368 4544 omsecor.exe 106 PID 4544 wrote to memory of 3368 4544 omsecor.exe 106 PID 4544 wrote to memory of 3368 4544 omsecor.exe 106 PID 3368 wrote to memory of 4376 3368 omsecor.exe 107 PID 3368 wrote to memory of 4376 3368 omsecor.exe 107 PID 3368 wrote to memory of 4376 3368 omsecor.exe 107 PID 3368 wrote to memory of 4376 3368 omsecor.exe 107 PID 3368 wrote to memory of 4376 3368 omsecor.exe 107 PID 4376 wrote to memory of 796 4376 omsecor.exe 109 PID 4376 wrote to memory of 796 4376 omsecor.exe 109 PID 4376 wrote to memory of 796 4376 omsecor.exe 109 PID 796 wrote to memory of 4632 796 omsecor.exe 111 PID 796 wrote to memory of 4632 796 omsecor.exe 111 PID 796 wrote to memory of 4632 796 omsecor.exe 111 PID 796 wrote to memory of 4632 796 omsecor.exe 111 PID 796 wrote to memory of 4632 796 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exeC:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 2568⤵
- Program crash
PID:2932
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 2966⤵
- Program crash
PID:2340
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 2844⤵
- Program crash
PID:4836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 2882⤵
- Program crash
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2636 -ip 26361⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 736 -ip 7361⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3368 -ip 33681⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 796 -ip 7961⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a41c17f36284edef75f8d37b7727ef22
SHA14be4735cbf6d501be16130592ff4bb0aed4f9b1f
SHA256ec4ae3f158359629949340ede7a692c19496771f3bf6ec111b60d03e83e6b9a4
SHA512e3cbce5ec84cc5413c9353da2d895bfabd258783efdd78bc6c15eabaf4f09f8fc483eef3210ce741ced573b957cdb048e38ea59dbcc447be083b86c2c2f4bdff
-
Filesize
96KB
MD56e897a612472ad8b51062a6844a8a17b
SHA15c4ba9ffcfbe52029f8bfadb883764b723d3fd38
SHA2560360e1344a1faf0e855e4798bb824e5492159b6c35b83f1cf43024a9bbc1adf9
SHA51253e606db7f73e85a5f0b269747d938ac07e3abf32d601fcb4ef89f4a8804340b3354887b9e65bed6ac3be8c338e236bf81c493cefdca2feeee2c3f0edc809ed8
-
Filesize
96KB
MD5dccd15cc3c38ff19a50c0d12d8a397c7
SHA19db492e0c477f03bf77fd8ca08f7e53ded24ab0c
SHA256da0c8b48c3e0c2eb65b4716012da1533e132997ac799f188fa68f7fdd95368bb
SHA512fae5865098a7d66dd911240d8902c5e0be81d03b5e8c8e1ee125fea625ff0718b57b5be89713b8243b2740de6b6ac05ab33f10047c423b9e7d38cf6b6c6d0a88