Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe
Resource
win7-20240729-en
General
-
Target
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe
-
Size
96KB
-
MD5
61a1cb816a8894547b2256ee527225bf
-
SHA1
97f0ec975b33cf88b9e530bbec8adb1142e52a17
-
SHA256
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08
-
SHA512
fe674302ac6df2b610d5f6799cfd42c9e33b26e5e97d977665aa84a61976b6a5a3e4aa78a97c9e2ad6f5200eec73e1fdf683e6e73288b259b213543d4026ff27
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxa:xGs8cd8eXlYairZYqMddH13a
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3332 omsecor.exe 3436 omsecor.exe 1928 omsecor.exe 4492 omsecor.exe 4868 omsecor.exe 1780 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3272 set thread context of 2768 3272 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 82 PID 3332 set thread context of 3436 3332 omsecor.exe 86 PID 1928 set thread context of 4492 1928 omsecor.exe 100 PID 4868 set thread context of 1780 4868 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 3652 3272 WerFault.exe 81 3520 3332 WerFault.exe 84 3760 1928 WerFault.exe 99 3812 4868 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3272 wrote to memory of 2768 3272 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 82 PID 3272 wrote to memory of 2768 3272 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 82 PID 3272 wrote to memory of 2768 3272 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 82 PID 3272 wrote to memory of 2768 3272 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 82 PID 3272 wrote to memory of 2768 3272 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 82 PID 2768 wrote to memory of 3332 2768 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 84 PID 2768 wrote to memory of 3332 2768 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 84 PID 2768 wrote to memory of 3332 2768 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 84 PID 3332 wrote to memory of 3436 3332 omsecor.exe 86 PID 3332 wrote to memory of 3436 3332 omsecor.exe 86 PID 3332 wrote to memory of 3436 3332 omsecor.exe 86 PID 3332 wrote to memory of 3436 3332 omsecor.exe 86 PID 3332 wrote to memory of 3436 3332 omsecor.exe 86 PID 3436 wrote to memory of 1928 3436 omsecor.exe 99 PID 3436 wrote to memory of 1928 3436 omsecor.exe 99 PID 3436 wrote to memory of 1928 3436 omsecor.exe 99 PID 1928 wrote to memory of 4492 1928 omsecor.exe 100 PID 1928 wrote to memory of 4492 1928 omsecor.exe 100 PID 1928 wrote to memory of 4492 1928 omsecor.exe 100 PID 1928 wrote to memory of 4492 1928 omsecor.exe 100 PID 1928 wrote to memory of 4492 1928 omsecor.exe 100 PID 4492 wrote to memory of 4868 4492 omsecor.exe 102 PID 4492 wrote to memory of 4868 4492 omsecor.exe 102 PID 4492 wrote to memory of 4868 4492 omsecor.exe 102 PID 4868 wrote to memory of 1780 4868 omsecor.exe 103 PID 4868 wrote to memory of 1780 4868 omsecor.exe 103 PID 4868 wrote to memory of 1780 4868 omsecor.exe 103 PID 4868 wrote to memory of 1780 4868 omsecor.exe 103 PID 4868 wrote to memory of 1780 4868 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe"C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exeC:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 2568⤵
- Program crash
PID:3812
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 3006⤵
- Program crash
PID:3760
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 2764⤵
- Program crash
PID:3520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 3002⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3272 -ip 32721⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3332 -ip 33321⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1928 -ip 19281⤵PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4868 -ip 48681⤵PID:3372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5045abfcbc28cb864ff7e4efbebf736a7
SHA1a3eeca0aefe9437a8b5f401895ec7ab96a71ba5e
SHA25639e34a66804a5c5311374661b5c6b3404c3301b9fbbec2184ad591a137e1c9e2
SHA51215b758317856b5d9935f355b9ce621837859e043044e266e09223abbcb559bbf284638f3ac7f5e7356efa08cb373226c9d95e2c7d6db16e020e8d6e775549b80
-
Filesize
96KB
MD5e61134b85d39524ea035814a4392d5bc
SHA11425bc448977f568791172d9d962843ebe2ebd2d
SHA25646a1a89c3c55328bf4e54bd1f2781ca7b4b5a1e3552b3132b4e04b0a9dfc4478
SHA512242513190ec5843f1ba7a2a20e7b8495111780e906d7553d127410545e251b722b51a8a9597a2164aea9142365c291e097f22115b08a69683f93c2d4f4b855ee
-
Filesize
96KB
MD5035387000a3883f856bc0dabd87129c1
SHA14ca0a2b7bef2102758fb21b0d55bb6b401cd2e93
SHA256d1b7357fc5d7a7da8ae59bf196066071657cf72e57a853e22de757a490d40b35
SHA512c1b245cef4ca5ce20526da2ff487917663606e5d7c8ac159124a996e318b228883d0d9f2a92036de9d8f28e9ed8877630186a1a47b9f2b98d1ee7413f33f073f