Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe
Resource
win7-20240729-en
General
-
Target
fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe
-
Size
96KB
-
MD5
6ced5dec9139ac608aa89bdc528bc2ae
-
SHA1
ee1ab36b4ac0a9b1726ba0a6b2a555a04cfc7ed6
-
SHA256
fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e
-
SHA512
3f2eb264fc7b36f5782e6effe2c9b5df3534bd425103cb9135828c7cc5826d6b692bc2fc9193fd83a17f88c0a212ba6219e61cb17326b71c1c515d0cdc7f5244
-
SSDEEP
1536:WnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:WGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2312 omsecor.exe 4756 omsecor.exe 2024 omsecor.exe 3620 omsecor.exe 2484 omsecor.exe 3292 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4748 set thread context of 3968 4748 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 83 PID 2312 set thread context of 4756 2312 omsecor.exe 88 PID 2024 set thread context of 3620 2024 omsecor.exe 108 PID 2484 set thread context of 3292 2484 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 5096 4748 WerFault.exe 82 5092 2312 WerFault.exe 86 2168 2024 WerFault.exe 107 964 2484 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3968 4748 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 83 PID 4748 wrote to memory of 3968 4748 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 83 PID 4748 wrote to memory of 3968 4748 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 83 PID 4748 wrote to memory of 3968 4748 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 83 PID 4748 wrote to memory of 3968 4748 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 83 PID 3968 wrote to memory of 2312 3968 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 86 PID 3968 wrote to memory of 2312 3968 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 86 PID 3968 wrote to memory of 2312 3968 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 86 PID 2312 wrote to memory of 4756 2312 omsecor.exe 88 PID 2312 wrote to memory of 4756 2312 omsecor.exe 88 PID 2312 wrote to memory of 4756 2312 omsecor.exe 88 PID 2312 wrote to memory of 4756 2312 omsecor.exe 88 PID 2312 wrote to memory of 4756 2312 omsecor.exe 88 PID 4756 wrote to memory of 2024 4756 omsecor.exe 107 PID 4756 wrote to memory of 2024 4756 omsecor.exe 107 PID 4756 wrote to memory of 2024 4756 omsecor.exe 107 PID 2024 wrote to memory of 3620 2024 omsecor.exe 108 PID 2024 wrote to memory of 3620 2024 omsecor.exe 108 PID 2024 wrote to memory of 3620 2024 omsecor.exe 108 PID 2024 wrote to memory of 3620 2024 omsecor.exe 108 PID 2024 wrote to memory of 3620 2024 omsecor.exe 108 PID 3620 wrote to memory of 2484 3620 omsecor.exe 110 PID 3620 wrote to memory of 2484 3620 omsecor.exe 110 PID 3620 wrote to memory of 2484 3620 omsecor.exe 110 PID 2484 wrote to memory of 3292 2484 omsecor.exe 111 PID 2484 wrote to memory of 3292 2484 omsecor.exe 111 PID 2484 wrote to memory of 3292 2484 omsecor.exe 111 PID 2484 wrote to memory of 3292 2484 omsecor.exe 111 PID 2484 wrote to memory of 3292 2484 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe"C:\Users\Admin\AppData\Local\Temp\fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exeC:\Users\Admin\AppData\Local\Temp\fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 2568⤵
- Program crash
PID:964
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 2926⤵
- Program crash
PID:2168
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 2924⤵
- Program crash
PID:5092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 2722⤵
- Program crash
PID:5096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4748 -ip 47481⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2312 -ip 23121⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2024 -ip 20241⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2484 -ip 24841⤵PID:2508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5003f048049ab39e46c40c004615f9db8
SHA18d808ac2b3054917bc163315dc3129b98566110d
SHA256827518f916054662bbb8e34d3531d5bdcc597853548cd1f6811362d4772d1911
SHA512f8b95d5920c6a893a38b2c60b7db3ef156f338a5f49b04d3a67021d2e607367e448799133e5049cab18e20436fdcc8a8433d4800c38d2ac4e37b83894ef94d36
-
Filesize
96KB
MD5e16b61cd5ae180d84c590fffbebed3e0
SHA1c7454950d51ca3a9e640cf6f29623b442a280dd5
SHA2565915d70518585f9cce4cabe36c7430ff9058bde33d63d297788c3c02f681fa9b
SHA512c4a70f3efd0c24a8698f0f6f0826e295fecb1a67067a1e51742581e8e45c50918a427f1595fb95232c5f4e7d335f8ee78e524395ee41ac4349bb6538ad94a368
-
Filesize
96KB
MD5f4f86ab6a939086e0926b8f43fd13fd7
SHA1aaf922ad63c343df389c60cf7425cee9d49cf691
SHA256d45fac1491220b8f8b23a81e73eb843151d097a064cefd2f1d9ec2cf8b5edf1b
SHA5129d0a25440be97af8614fa699a0064af9ac55aa38ae81dd8ff98f758ea21debb05538d27adbe2f5830d366a58938289085ac48cfdf1d4b785df0ea8577a255a37