Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe
Resource
win7-20240729-en
General
-
Target
4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe
-
Size
96KB
-
MD5
e832b67fa627951c25c64db2d4f55820
-
SHA1
e91f9293f1eb892fe96a2e073e5ce2d2b284e488
-
SHA256
4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63a
-
SHA512
1e4be83f846b3149941e30a690b88e163a3ae652b2be5498025ddebc0097c60e377fc14275092222b28f4892571bb2dc169d2cc16d91b7dab1c9d71a6bd536a6
-
SSDEEP
1536:QnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:QGs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1256 omsecor.exe 3780 omsecor.exe 1388 omsecor.exe 3168 omsecor.exe 3528 omsecor.exe 2520 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2064 set thread context of 4144 2064 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 82 PID 1256 set thread context of 3780 1256 omsecor.exe 86 PID 1388 set thread context of 3168 1388 omsecor.exe 100 PID 3528 set thread context of 2520 3528 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 400 1256 WerFault.exe 85 2248 2064 WerFault.exe 81 4356 1388 WerFault.exe 99 544 3528 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2064 wrote to memory of 4144 2064 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 82 PID 2064 wrote to memory of 4144 2064 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 82 PID 2064 wrote to memory of 4144 2064 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 82 PID 2064 wrote to memory of 4144 2064 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 82 PID 2064 wrote to memory of 4144 2064 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 82 PID 4144 wrote to memory of 1256 4144 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 85 PID 4144 wrote to memory of 1256 4144 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 85 PID 4144 wrote to memory of 1256 4144 4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe 85 PID 1256 wrote to memory of 3780 1256 omsecor.exe 86 PID 1256 wrote to memory of 3780 1256 omsecor.exe 86 PID 1256 wrote to memory of 3780 1256 omsecor.exe 86 PID 1256 wrote to memory of 3780 1256 omsecor.exe 86 PID 1256 wrote to memory of 3780 1256 omsecor.exe 86 PID 3780 wrote to memory of 1388 3780 omsecor.exe 99 PID 3780 wrote to memory of 1388 3780 omsecor.exe 99 PID 3780 wrote to memory of 1388 3780 omsecor.exe 99 PID 1388 wrote to memory of 3168 1388 omsecor.exe 100 PID 1388 wrote to memory of 3168 1388 omsecor.exe 100 PID 1388 wrote to memory of 3168 1388 omsecor.exe 100 PID 1388 wrote to memory of 3168 1388 omsecor.exe 100 PID 1388 wrote to memory of 3168 1388 omsecor.exe 100 PID 3168 wrote to memory of 3528 3168 omsecor.exe 102 PID 3168 wrote to memory of 3528 3168 omsecor.exe 102 PID 3168 wrote to memory of 3528 3168 omsecor.exe 102 PID 3528 wrote to memory of 2520 3528 omsecor.exe 104 PID 3528 wrote to memory of 2520 3528 omsecor.exe 104 PID 3528 wrote to memory of 2520 3528 omsecor.exe 104 PID 3528 wrote to memory of 2520 3528 omsecor.exe 104 PID 3528 wrote to memory of 2520 3528 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe"C:\Users\Admin\AppData\Local\Temp\4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exeC:\Users\Admin\AppData\Local\Temp\4ad417c6715cc086ed9d68be94c414142fa4884b539f462faebada4eab7ce63aN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 2568⤵
- Program crash
PID:544
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 2926⤵
- Program crash
PID:4356
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 2884⤵
- Program crash
PID:400
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 2882⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2064 -ip 20641⤵PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1256 -ip 12561⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1388 -ip 13881⤵PID:3884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3528 -ip 35281⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5aacb4d008b1e5c3cb7b4e447f8cdd3cd
SHA19ba6af6bc874f2a31ad860e24bdc820435f4c19e
SHA256b3f734003bd0b4a58c73f930d574927098b26488d5089807234a2e58da38a8c0
SHA5128a6f3e644a1fb664171c63a744809a00343511f28142dd2c35fd0575e2f0c177eb2070947c6a4716701caa1061d66e18238cb2f4086ef957325ba4cfbad14e9e
-
Filesize
96KB
MD5ea38955d3762811329f817a0e18eae8b
SHA19816c53289c40f27d497097ba8fb214a10dc153b
SHA256ef0bd2f41a30a6868789ebf07ad859e97e9ae1f0520f898859498b2ebb2528bf
SHA51205c65961594417b4859a1267fcd369f801607ba40937988d60dec9ebab4e6f0ff2b93acfa3c4b1047aa27532cb7ddf03547978001519cc2716f165c70dd333fd
-
Filesize
96KB
MD528ff91b35992bccc8e4c48f8467636c1
SHA185b27fc748ddc232db0ac4d25e6ed7086b00cce7
SHA256bd945f323cde39b17ebd7f391b1b67f68e5c505bdfd2da1ba84081977499e38a
SHA512fde0887d182d882d3fb92f77cbbcde244330b7c5d610ba7cc39d6d3315919cc163407240ea71b061c09e0be95da9a5ab94e63f61e10babbd51567812000d1f45