Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 22:56
Static task
static1
Behavioral task
behavioral1
Sample
db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe
Resource
win7-20240903-en
General
-
Target
db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe
-
Size
96KB
-
MD5
71a35adcb47d08e9879a9d1e96e199b0
-
SHA1
aa6d1307b61f33132f18a62a47229702baf2652f
-
SHA256
db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735
-
SHA512
6a1cc39604093445f2e90f36becee36be7f4a8fa8b8277b5df59dad3105654446e1df0f37256aa302fa7a78f6d2ad54c549d97dddcbb02f994e7df63d203ffd7
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxJ:UGs8cd8eXlYairZYqMddH13J
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1752 omsecor.exe 4756 omsecor.exe 4488 omsecor.exe 1472 omsecor.exe 5048 omsecor.exe 1436 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3620 set thread context of 4940 3620 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 83 PID 1752 set thread context of 4756 1752 omsecor.exe 87 PID 4488 set thread context of 1472 4488 omsecor.exe 108 PID 5048 set thread context of 1436 5048 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 4316 1752 WerFault.exe 85 4824 3620 WerFault.exe 82 728 4488 WerFault.exe 107 4968 5048 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3620 wrote to memory of 4940 3620 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 83 PID 3620 wrote to memory of 4940 3620 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 83 PID 3620 wrote to memory of 4940 3620 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 83 PID 3620 wrote to memory of 4940 3620 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 83 PID 3620 wrote to memory of 4940 3620 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 83 PID 4940 wrote to memory of 1752 4940 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 85 PID 4940 wrote to memory of 1752 4940 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 85 PID 4940 wrote to memory of 1752 4940 db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe 85 PID 1752 wrote to memory of 4756 1752 omsecor.exe 87 PID 1752 wrote to memory of 4756 1752 omsecor.exe 87 PID 1752 wrote to memory of 4756 1752 omsecor.exe 87 PID 1752 wrote to memory of 4756 1752 omsecor.exe 87 PID 1752 wrote to memory of 4756 1752 omsecor.exe 87 PID 4756 wrote to memory of 4488 4756 omsecor.exe 107 PID 4756 wrote to memory of 4488 4756 omsecor.exe 107 PID 4756 wrote to memory of 4488 4756 omsecor.exe 107 PID 4488 wrote to memory of 1472 4488 omsecor.exe 108 PID 4488 wrote to memory of 1472 4488 omsecor.exe 108 PID 4488 wrote to memory of 1472 4488 omsecor.exe 108 PID 4488 wrote to memory of 1472 4488 omsecor.exe 108 PID 4488 wrote to memory of 1472 4488 omsecor.exe 108 PID 1472 wrote to memory of 5048 1472 omsecor.exe 110 PID 1472 wrote to memory of 5048 1472 omsecor.exe 110 PID 1472 wrote to memory of 5048 1472 omsecor.exe 110 PID 5048 wrote to memory of 1436 5048 omsecor.exe 111 PID 5048 wrote to memory of 1436 5048 omsecor.exe 111 PID 5048 wrote to memory of 1436 5048 omsecor.exe 111 PID 5048 wrote to memory of 1436 5048 omsecor.exe 111 PID 5048 wrote to memory of 1436 5048 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe"C:\Users\Admin\AppData\Local\Temp\db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exeC:\Users\Admin\AppData\Local\Temp\db5156a7b1f449a6ab9d7225c087ef5785b0c9d4cf4c254a3467330486b3f735N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 2688⤵
- Program crash
PID:4968
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 2926⤵
- Program crash
PID:728
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 2884⤵
- Program crash
PID:4316
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 3002⤵
- Program crash
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3620 -ip 36201⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1752 -ip 17521⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4488 -ip 44881⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5048 -ip 50481⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d0c2107372c7328c88b475cc0c4a619f
SHA1755558f4fd38a90aec54a831045f11c1a5eeea8e
SHA25697c0d7bfe8da71cb59a721ba7c1b0449397c3a31625df058bad152d85f63c5c7
SHA512911f579e9316b38072532533f8acbe70d284b17e3feddcf3b5af2035486b18b479d0ad03a994ff4f0c095fd115ec6c737a3a2dab47496085caae75a1d5089bd4
-
Filesize
96KB
MD567c5957647e48283885619ab55646632
SHA15e50ce538a8be4a2f95fd853dc048404a09dd070
SHA25633687d7d3bbfb7aa4ca0ce9c64715ea28d73f47897cce27f477d2589036b78fa
SHA5123b702617f2c920bbe26f5814df9262c56dc59c52f54e1925153b7174cfc32fbec047742211c84b5f944e059b96ab948159fd895c37be095b47d87ed21152d41b
-
Filesize
96KB
MD5fb463bff77b44916db8d5136becfe8ea
SHA1b0e60d4c0dcaea6c5f220eda430750e13cf5cf61
SHA2567597196832ceb1e2883f76b6b810de424dd6684fd17cca741100f60ba12dce81
SHA5127b42ca3cf848a844a3e60e7f63f5bba912da6798978dfc8ee9a2ad96234fd4f0ab4183e048b0748c8b6a7624a0cc948a6514083598103ff027d0ed67c94918bd