Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe
Resource
win7-20240903-en
General
-
Target
c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe
-
Size
96KB
-
MD5
88a830fdf0f96f8643fc290710c0a580
-
SHA1
68fa6d58b5f014a8061456736413a7cc933805b4
-
SHA256
c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1
-
SHA512
7b756edc66fcdf047b49744b3d02bbc988d30c570fa075cbac0be04a157947e5d8c4f6aa6f6b8a08d4daa39a4b5f33b81f9e05adc00bfbd73451ceb53ec33e2c
-
SSDEEP
1536:JnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:JGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2260 omsecor.exe 4948 omsecor.exe 2072 omsecor.exe 4800 omsecor.exe 4296 omsecor.exe 5092 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1660 set thread context of 5100 1660 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 82 PID 2260 set thread context of 4948 2260 omsecor.exe 87 PID 2072 set thread context of 4800 2072 omsecor.exe 100 PID 4296 set thread context of 5092 4296 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 3120 1660 WerFault.exe 81 4496 2260 WerFault.exe 85 3844 2072 WerFault.exe 99 1728 4296 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1660 wrote to memory of 5100 1660 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 82 PID 1660 wrote to memory of 5100 1660 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 82 PID 1660 wrote to memory of 5100 1660 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 82 PID 1660 wrote to memory of 5100 1660 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 82 PID 1660 wrote to memory of 5100 1660 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 82 PID 5100 wrote to memory of 2260 5100 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 85 PID 5100 wrote to memory of 2260 5100 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 85 PID 5100 wrote to memory of 2260 5100 c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe 85 PID 2260 wrote to memory of 4948 2260 omsecor.exe 87 PID 2260 wrote to memory of 4948 2260 omsecor.exe 87 PID 2260 wrote to memory of 4948 2260 omsecor.exe 87 PID 2260 wrote to memory of 4948 2260 omsecor.exe 87 PID 2260 wrote to memory of 4948 2260 omsecor.exe 87 PID 4948 wrote to memory of 2072 4948 omsecor.exe 99 PID 4948 wrote to memory of 2072 4948 omsecor.exe 99 PID 4948 wrote to memory of 2072 4948 omsecor.exe 99 PID 2072 wrote to memory of 4800 2072 omsecor.exe 100 PID 2072 wrote to memory of 4800 2072 omsecor.exe 100 PID 2072 wrote to memory of 4800 2072 omsecor.exe 100 PID 2072 wrote to memory of 4800 2072 omsecor.exe 100 PID 2072 wrote to memory of 4800 2072 omsecor.exe 100 PID 4800 wrote to memory of 4296 4800 omsecor.exe 102 PID 4800 wrote to memory of 4296 4800 omsecor.exe 102 PID 4800 wrote to memory of 4296 4800 omsecor.exe 102 PID 4296 wrote to memory of 5092 4296 omsecor.exe 103 PID 4296 wrote to memory of 5092 4296 omsecor.exe 103 PID 4296 wrote to memory of 5092 4296 omsecor.exe 103 PID 4296 wrote to memory of 5092 4296 omsecor.exe 103 PID 4296 wrote to memory of 5092 4296 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe"C:\Users\Admin\AppData\Local\Temp\c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exeC:\Users\Admin\AppData\Local\Temp\c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 2568⤵
- Program crash
PID:1728
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 2926⤵
- Program crash
PID:3844
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 2884⤵
- Program crash
PID:4496
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2922⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1660 -ip 16601⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2260 -ip 22601⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2072 -ip 20721⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4296 -ip 42961⤵PID:3644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD500cc1309e57517997012a8ac4c3ff254
SHA166539c0f33dff7e76aa2667de49906ecb1dc033b
SHA256dae0d6cae4010106e1d59f138b51d322e18f5e6af97c18e9af775dec3e7d5dae
SHA512bfca9fca7465663213013a04af685997a4119c6d6ef9c48c765f5e069d90fe3917e34b7083ceb99b89fa8728e29782d711d948f166a0ec37d1343412fd5fed02
-
Filesize
96KB
MD579c6288b99bfde226ea4f9ba645f6d08
SHA1fd7ce5ce79dd1c8662d583eb700acab3e49061fc
SHA256da1223ebe8ae371ba4444710cfabb99cc5a0a24d5b9d55d54b2d67acedacda26
SHA51226a949bcb8b033cc11c9fc21fae34306a67d4f9134cb714dde71eb25a319ca166a0fcbdf1cd728b75166a6f5b4f5a2a58687e4e8355a9b5df59b1247781b089c
-
Filesize
96KB
MD5437bd333267c2ebb317883e3af7d4f34
SHA13012f4e0f91bdb4e57e0ae1f49c967d6e15e987a
SHA2565380af48baff9723cd23f44ea2cd15fa36cc56c6948ae579b78bacbdae9517bb
SHA51251b741ccc041bb8297b2b66f824f75774d56cdc041241a3e4954d17299ab3916d8cd9827ed0d4e4b2565e42a552849a8b5b77b264d63b52c67b9d9dd1693a595