Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe
Resource
win7-20241010-en
General
-
Target
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe
-
Size
96KB
-
MD5
61a1cb816a8894547b2256ee527225bf
-
SHA1
97f0ec975b33cf88b9e530bbec8adb1142e52a17
-
SHA256
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08
-
SHA512
fe674302ac6df2b610d5f6799cfd42c9e33b26e5e97d977665aa84a61976b6a5a3e4aa78a97c9e2ad6f5200eec73e1fdf683e6e73288b259b213543d4026ff27
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxa:xGs8cd8eXlYairZYqMddH13a
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1616 omsecor.exe 2124 omsecor.exe 2364 omsecor.exe 4420 omsecor.exe 3688 omsecor.exe 1948 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4304 set thread context of 676 4304 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 83 PID 1616 set thread context of 2124 1616 omsecor.exe 87 PID 2364 set thread context of 4420 2364 omsecor.exe 109 PID 3688 set thread context of 1948 3688 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 2068 4304 WerFault.exe 82 3676 1616 WerFault.exe 86 1364 2364 WerFault.exe 108 1816 3688 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4304 wrote to memory of 676 4304 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 83 PID 4304 wrote to memory of 676 4304 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 83 PID 4304 wrote to memory of 676 4304 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 83 PID 4304 wrote to memory of 676 4304 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 83 PID 4304 wrote to memory of 676 4304 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 83 PID 676 wrote to memory of 1616 676 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 86 PID 676 wrote to memory of 1616 676 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 86 PID 676 wrote to memory of 1616 676 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 86 PID 1616 wrote to memory of 2124 1616 omsecor.exe 87 PID 1616 wrote to memory of 2124 1616 omsecor.exe 87 PID 1616 wrote to memory of 2124 1616 omsecor.exe 87 PID 1616 wrote to memory of 2124 1616 omsecor.exe 87 PID 1616 wrote to memory of 2124 1616 omsecor.exe 87 PID 2124 wrote to memory of 2364 2124 omsecor.exe 108 PID 2124 wrote to memory of 2364 2124 omsecor.exe 108 PID 2124 wrote to memory of 2364 2124 omsecor.exe 108 PID 2364 wrote to memory of 4420 2364 omsecor.exe 109 PID 2364 wrote to memory of 4420 2364 omsecor.exe 109 PID 2364 wrote to memory of 4420 2364 omsecor.exe 109 PID 2364 wrote to memory of 4420 2364 omsecor.exe 109 PID 2364 wrote to memory of 4420 2364 omsecor.exe 109 PID 4420 wrote to memory of 3688 4420 omsecor.exe 111 PID 4420 wrote to memory of 3688 4420 omsecor.exe 111 PID 4420 wrote to memory of 3688 4420 omsecor.exe 111 PID 3688 wrote to memory of 1948 3688 omsecor.exe 113 PID 3688 wrote to memory of 1948 3688 omsecor.exe 113 PID 3688 wrote to memory of 1948 3688 omsecor.exe 113 PID 3688 wrote to memory of 1948 3688 omsecor.exe 113 PID 3688 wrote to memory of 1948 3688 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe"C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exeC:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 2568⤵
- Program crash
PID:1816
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 2966⤵
- Program crash
PID:1364
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2884⤵
- Program crash
PID:3676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 2882⤵
- Program crash
PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4304 -ip 43041⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1616 -ip 16161⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2364 -ip 23641⤵PID:1260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3688 -ip 36881⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5045abfcbc28cb864ff7e4efbebf736a7
SHA1a3eeca0aefe9437a8b5f401895ec7ab96a71ba5e
SHA25639e34a66804a5c5311374661b5c6b3404c3301b9fbbec2184ad591a137e1c9e2
SHA51215b758317856b5d9935f355b9ce621837859e043044e266e09223abbcb559bbf284638f3ac7f5e7356efa08cb373226c9d95e2c7d6db16e020e8d6e775549b80
-
Filesize
96KB
MD50ee28e7f5ad689f086ed4c684987c37d
SHA168e9b742f75139ad65e729a0bb052bddfa328b3a
SHA2569652c7a6a2858d5f25c5ea8126bb5fce9b9cc3439da18882fb71c974bb18c6a2
SHA512e7e8b63893e3e9d694d9f9e4e0cdffc3c9bfee13dc2ab5511e24c9acce7e4421c7eaa3799616179b3a07246702dae8befd9039f05669e541354b4bdf69b79c00
-
Filesize
96KB
MD5e36dc7877423541acacf7144d7a08394
SHA13906f21db44a62b9e612f46f2e7585d73917e2a3
SHA256ee80c2a491c92871780ad5f8ffebe7b770ed03de04b98ae8eb5164947442b5c7
SHA5129b25dc55debd32f5a4ef652bacd7d964a26264b8c880fe18c46cca2fa262d1bb08d8f492c91d41980cafa8aa1d87c2b62f668677281abbe6434798bc30a58268