Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe
Resource
win7-20240708-en
General
-
Target
66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe
-
Size
96KB
-
MD5
69dfdeca39d9c50c13a487d64817e3e6
-
SHA1
eacdde8c1248aca68d777f9994f2e0a04932c089
-
SHA256
66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641
-
SHA512
ff2b8bb45c5828acbff4e8af00259c4da4d197ea13a364701d5da82b0622fe6b5c2a1afe25ef0cede413252749d4f185d53ac673775397476ada3b90e0157c56
-
SSDEEP
1536:AnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:AGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4020 omsecor.exe 1240 omsecor.exe 1844 omsecor.exe 1680 omsecor.exe 4164 omsecor.exe 4428 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 868 set thread context of 3744 868 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 83 PID 4020 set thread context of 1240 4020 omsecor.exe 88 PID 1844 set thread context of 1680 1844 omsecor.exe 109 PID 4164 set thread context of 4428 4164 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3480 868 WerFault.exe 82 3856 4020 WerFault.exe 86 1900 1844 WerFault.exe 108 532 4164 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 868 wrote to memory of 3744 868 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 83 PID 868 wrote to memory of 3744 868 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 83 PID 868 wrote to memory of 3744 868 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 83 PID 868 wrote to memory of 3744 868 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 83 PID 868 wrote to memory of 3744 868 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 83 PID 3744 wrote to memory of 4020 3744 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 86 PID 3744 wrote to memory of 4020 3744 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 86 PID 3744 wrote to memory of 4020 3744 66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe 86 PID 4020 wrote to memory of 1240 4020 omsecor.exe 88 PID 4020 wrote to memory of 1240 4020 omsecor.exe 88 PID 4020 wrote to memory of 1240 4020 omsecor.exe 88 PID 4020 wrote to memory of 1240 4020 omsecor.exe 88 PID 4020 wrote to memory of 1240 4020 omsecor.exe 88 PID 1240 wrote to memory of 1844 1240 omsecor.exe 108 PID 1240 wrote to memory of 1844 1240 omsecor.exe 108 PID 1240 wrote to memory of 1844 1240 omsecor.exe 108 PID 1844 wrote to memory of 1680 1844 omsecor.exe 109 PID 1844 wrote to memory of 1680 1844 omsecor.exe 109 PID 1844 wrote to memory of 1680 1844 omsecor.exe 109 PID 1844 wrote to memory of 1680 1844 omsecor.exe 109 PID 1844 wrote to memory of 1680 1844 omsecor.exe 109 PID 1680 wrote to memory of 4164 1680 omsecor.exe 111 PID 1680 wrote to memory of 4164 1680 omsecor.exe 111 PID 1680 wrote to memory of 4164 1680 omsecor.exe 111 PID 4164 wrote to memory of 4428 4164 omsecor.exe 113 PID 4164 wrote to memory of 4428 4164 omsecor.exe 113 PID 4164 wrote to memory of 4428 4164 omsecor.exe 113 PID 4164 wrote to memory of 4428 4164 omsecor.exe 113 PID 4164 wrote to memory of 4428 4164 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe"C:\Users\Admin\AppData\Local\Temp\66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exeC:\Users\Admin\AppData\Local\Temp\66319b5acaf19922c0f24db2948aed1cd2d6c27bb0b0dbf57dece7dad2bbf641.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 2408⤵
- Program crash
PID:532
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 2926⤵
- Program crash
PID:1900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 2884⤵
- Program crash
PID:3856
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 2882⤵
- Program crash
PID:3480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 868 -ip 8681⤵PID:3204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4020 -ip 40201⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1844 -ip 18441⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4164 -ip 41641⤵PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e66d35e0820cb26ab9823fc37a89c943
SHA171a7b85880061c1a7194b97aed95543e2929cdd4
SHA256c51f5f3451574db95d5da9e5fd0523c9e1c8497b208678d694bcfecdc4b34498
SHA51288dd3bc31c4d6c683e6dc5005e475497a6acbfbac1495b7a0ad9670ba4708c62cb64d683059f9db81f507dcd21979f6f7a286c25de883b989806224987330355
-
Filesize
96KB
MD51fde71e7b172e9638fcc96499842737b
SHA195b7b117829be53fccd18ceb5d15b68b8ce1b6cd
SHA256ccbc9e568b7585662c249e85dcc822b2eccbc3223b0f69a835a306f2711f67c0
SHA51284183aefb0a92831c1183665b5d66c5cdc15787a24bf9e258f2fbf0743fddf27c099af510881a615314071d4b1e4517e7f82b918dacd639828498a402e37821d
-
Filesize
96KB
MD517746266a1ef9bdc5c9c604608491f7a
SHA15aa552ae533f34e040f7f8719dd398f12e1d65e2
SHA2567ce7783f9a735d1ce2f53ac99c0a572e67a645029cc58ee2ae55b59734d221c8
SHA51298bc5f6f4cfc35e77ceab0f4cc2c20cd16239208135fe95700c1b4a59a0c6ca03ffaeb801d7a45590d0b6fb0df868ef000fb442fc96f82f011e8a7db22711fb3