Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
Resource
win7-20240903-en
General
-
Target
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
-
Size
96KB
-
MD5
809d8bedb2da450b588bf82e9a118fe4
-
SHA1
5cb2c9863ddc2ba5346967bf0780554c8dc120f9
-
SHA256
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72
-
SHA512
4768075e7c02683f09e9d23339b5a69724c3439c711244c7761f9ceaf44f7c4a6d8b1189ab47214e4aa4a27e1fad1f07b4be4d3d374c87326611fc68be378287
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:hGs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3996 omsecor.exe 1544 omsecor.exe 4976 omsecor.exe 2296 omsecor.exe 4796 omsecor.exe 4776 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2892 set thread context of 3268 2892 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 82 PID 3996 set thread context of 1544 3996 omsecor.exe 87 PID 4976 set thread context of 2296 4976 omsecor.exe 100 PID 4796 set thread context of 4776 4796 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 1600 2892 WerFault.exe 81 772 3996 WerFault.exe 85 3752 4976 WerFault.exe 99 4464 4796 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2892 wrote to memory of 3268 2892 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 82 PID 2892 wrote to memory of 3268 2892 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 82 PID 2892 wrote to memory of 3268 2892 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 82 PID 2892 wrote to memory of 3268 2892 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 82 PID 2892 wrote to memory of 3268 2892 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 82 PID 3268 wrote to memory of 3996 3268 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 85 PID 3268 wrote to memory of 3996 3268 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 85 PID 3268 wrote to memory of 3996 3268 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 85 PID 3996 wrote to memory of 1544 3996 omsecor.exe 87 PID 3996 wrote to memory of 1544 3996 omsecor.exe 87 PID 3996 wrote to memory of 1544 3996 omsecor.exe 87 PID 3996 wrote to memory of 1544 3996 omsecor.exe 87 PID 3996 wrote to memory of 1544 3996 omsecor.exe 87 PID 1544 wrote to memory of 4976 1544 omsecor.exe 99 PID 1544 wrote to memory of 4976 1544 omsecor.exe 99 PID 1544 wrote to memory of 4976 1544 omsecor.exe 99 PID 4976 wrote to memory of 2296 4976 omsecor.exe 100 PID 4976 wrote to memory of 2296 4976 omsecor.exe 100 PID 4976 wrote to memory of 2296 4976 omsecor.exe 100 PID 4976 wrote to memory of 2296 4976 omsecor.exe 100 PID 4976 wrote to memory of 2296 4976 omsecor.exe 100 PID 2296 wrote to memory of 4796 2296 omsecor.exe 102 PID 2296 wrote to memory of 4796 2296 omsecor.exe 102 PID 2296 wrote to memory of 4796 2296 omsecor.exe 102 PID 4796 wrote to memory of 4776 4796 omsecor.exe 104 PID 4796 wrote to memory of 4776 4796 omsecor.exe 104 PID 4796 wrote to memory of 4776 4796 omsecor.exe 104 PID 4796 wrote to memory of 4776 4796 omsecor.exe 104 PID 4796 wrote to memory of 4776 4796 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exeC:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 2568⤵
- Program crash
PID:4464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 2926⤵
- Program crash
PID:3752
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 2884⤵
- Program crash
PID:772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 2602⤵
- Program crash
PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2892 -ip 28921⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3996 -ip 39961⤵PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4976 -ip 49761⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4796 -ip 47961⤵PID:3756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c386386231ae1df6d6175a6237b55f3a
SHA1757162daba1ce5ac68e454f61ba71df168fdf12f
SHA256d7017209e164b15c9dfb7958c652d7bd356544209b30e25a234b50c711e5cc58
SHA51287f60f6e8f17fdfa82c1c3682315347aa5d1fd76e4ff1141541ffe0007c25b40f429638c0da18ab3a9bd01110a84e947874aedf82a55cca9fdbea0cc7a843dec
-
Filesize
96KB
MD56e897a612472ad8b51062a6844a8a17b
SHA15c4ba9ffcfbe52029f8bfadb883764b723d3fd38
SHA2560360e1344a1faf0e855e4798bb824e5492159b6c35b83f1cf43024a9bbc1adf9
SHA51253e606db7f73e85a5f0b269747d938ac07e3abf32d601fcb4ef89f4a8804340b3354887b9e65bed6ac3be8c338e236bf81c493cefdca2feeee2c3f0edc809ed8
-
Filesize
96KB
MD5e01bb49554495d5638ee555b6aa4b9fc
SHA177ddeeee7aeac7538b18d57ec00d2cfb3cef8087
SHA25670ff2368d761cb6a837bf9270f0a1cf69cf7512b23f79eb56b078f0aa41f0831
SHA51295613c3383ac1cdad140412a2062a855484df3481b79ee8db30b7ac4dcc3d20cc9a74df955f87f451f7838cace3aad87b1e5172b6161d583c27a395d9e2eebe7