Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe
Resource
win7-20240903-en
General
-
Target
ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe
-
Size
96KB
-
MD5
f8a08329c22573430f4c245f838c66a9
-
SHA1
bae4f0a052a2d0faf497a64949b6ee8fb32d6261
-
SHA256
ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c
-
SHA512
ef84286ac76a894c11b1cd6b7bb88ba0d209eb95653ede138be8a1a69f9e442135800680dc63c7690ac2c099bf52f5911687db106e56090605199679c81692ac
-
SSDEEP
1536:9nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:9Gs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3600 omsecor.exe 2628 omsecor.exe 1924 omsecor.exe 4524 omsecor.exe 4684 omsecor.exe 3572 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4216 set thread context of 2452 4216 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 82 PID 3600 set thread context of 2628 3600 omsecor.exe 86 PID 1924 set thread context of 4524 1924 omsecor.exe 100 PID 4684 set thread context of 3572 4684 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 3452 3600 WerFault.exe 84 1800 4216 WerFault.exe 81 1708 1924 WerFault.exe 99 3980 4684 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4216 wrote to memory of 2452 4216 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 82 PID 4216 wrote to memory of 2452 4216 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 82 PID 4216 wrote to memory of 2452 4216 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 82 PID 4216 wrote to memory of 2452 4216 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 82 PID 4216 wrote to memory of 2452 4216 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 82 PID 2452 wrote to memory of 3600 2452 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 84 PID 2452 wrote to memory of 3600 2452 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 84 PID 2452 wrote to memory of 3600 2452 ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe 84 PID 3600 wrote to memory of 2628 3600 omsecor.exe 86 PID 3600 wrote to memory of 2628 3600 omsecor.exe 86 PID 3600 wrote to memory of 2628 3600 omsecor.exe 86 PID 3600 wrote to memory of 2628 3600 omsecor.exe 86 PID 3600 wrote to memory of 2628 3600 omsecor.exe 86 PID 2628 wrote to memory of 1924 2628 omsecor.exe 99 PID 2628 wrote to memory of 1924 2628 omsecor.exe 99 PID 2628 wrote to memory of 1924 2628 omsecor.exe 99 PID 1924 wrote to memory of 4524 1924 omsecor.exe 100 PID 1924 wrote to memory of 4524 1924 omsecor.exe 100 PID 1924 wrote to memory of 4524 1924 omsecor.exe 100 PID 1924 wrote to memory of 4524 1924 omsecor.exe 100 PID 1924 wrote to memory of 4524 1924 omsecor.exe 100 PID 4524 wrote to memory of 4684 4524 omsecor.exe 102 PID 4524 wrote to memory of 4684 4524 omsecor.exe 102 PID 4524 wrote to memory of 4684 4524 omsecor.exe 102 PID 4684 wrote to memory of 3572 4684 omsecor.exe 104 PID 4684 wrote to memory of 3572 4684 omsecor.exe 104 PID 4684 wrote to memory of 3572 4684 omsecor.exe 104 PID 4684 wrote to memory of 3572 4684 omsecor.exe 104 PID 4684 wrote to memory of 3572 4684 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe"C:\Users\Admin\AppData\Local\Temp\ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exeC:\Users\Admin\AppData\Local\Temp\ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 2528⤵
- Program crash
PID:3980
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 2926⤵
- Program crash
PID:1708
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 3004⤵
- Program crash
PID:3452
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 2882⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4216 -ip 42161⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3600 -ip 36001⤵PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1924 -ip 19241⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4684 -ip 46841⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58fb7b806fff402baeaaa4d7b6f921d2e
SHA101d401a410b98c409f371ec0a86ea9ecc0bff667
SHA256dc5c4e76220a9503baa973918e0069e97d3fdb4e43bd94e95cb42be2a9b00743
SHA512e9a3415b81569c67d404a8806f193ced9edb1ad46bf44e58de565c3f1d2d2e4c062218e6560210de084002ba9e1449f11bca9e79b938128a51594aa4f41b1e1e
-
Filesize
96KB
MD5967e0b4dcbfef0b1b6ebb793811cc2bb
SHA13e2c1162b334fb4000e3b9aff0c4feef02d25ea3
SHA256c772a34d9bc5d96a11662dda1cb8438c89f74b357f597b52cc53cc900dbd664f
SHA5129a61df8c620c444032f287d99a39db92445e3289a62175b1e1c9243b7f77497d34d595869e8b97598597317210546dd14503fd1f79793984288ac4963ea4cba0
-
Filesize
96KB
MD5a89e571cc5fc19846916300ee049cbd3
SHA148ccb4ca760e5004cb92d95c17f630ee5b022621
SHA256dc199003dd5308a2ec580220744bc596a5433aa96eaed22b4b689a33bb47f8c2
SHA512db8ff84dfae7c40fbb404a7a87f02ca5520d9222a9934e13a1d0fadb1dd2a607ba2a8a792f41f40a4e5beda94da4b5e501874876da2656ce084e96a78a80f32a