Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe
Resource
win7-20241010-en
General
-
Target
b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe
-
Size
96KB
-
MD5
31e55980ad69426261b8860429ee0c21
-
SHA1
4080b76d20fd5ab5cea415c344d98db4fa0731ef
-
SHA256
b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800
-
SHA512
8367438a0443204df982b1930f847de29cf233c0562030d8bb25201e70c01e10fd9abdccee88c307eb90a69bb912fd341e716a0b5c582814d81dd27ba8255c27
-
SSDEEP
1536:LnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:LGs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1472 omsecor.exe 3692 omsecor.exe 4132 omsecor.exe 3924 omsecor.exe 2480 omsecor.exe 736 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2068 set thread context of 3920 2068 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 83 PID 1472 set thread context of 3692 1472 omsecor.exe 87 PID 4132 set thread context of 3924 4132 omsecor.exe 106 PID 2480 set thread context of 736 2480 omsecor.exe 110 -
Program crash 4 IoCs
pid pid_target Process procid_target 4176 2068 WerFault.exe 82 3308 1472 WerFault.exe 85 1360 4132 WerFault.exe 105 4328 2480 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3920 2068 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 83 PID 2068 wrote to memory of 3920 2068 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 83 PID 2068 wrote to memory of 3920 2068 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 83 PID 2068 wrote to memory of 3920 2068 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 83 PID 2068 wrote to memory of 3920 2068 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 83 PID 3920 wrote to memory of 1472 3920 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 85 PID 3920 wrote to memory of 1472 3920 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 85 PID 3920 wrote to memory of 1472 3920 b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe 85 PID 1472 wrote to memory of 3692 1472 omsecor.exe 87 PID 1472 wrote to memory of 3692 1472 omsecor.exe 87 PID 1472 wrote to memory of 3692 1472 omsecor.exe 87 PID 1472 wrote to memory of 3692 1472 omsecor.exe 87 PID 1472 wrote to memory of 3692 1472 omsecor.exe 87 PID 3692 wrote to memory of 4132 3692 omsecor.exe 105 PID 3692 wrote to memory of 4132 3692 omsecor.exe 105 PID 3692 wrote to memory of 4132 3692 omsecor.exe 105 PID 4132 wrote to memory of 3924 4132 omsecor.exe 106 PID 4132 wrote to memory of 3924 4132 omsecor.exe 106 PID 4132 wrote to memory of 3924 4132 omsecor.exe 106 PID 4132 wrote to memory of 3924 4132 omsecor.exe 106 PID 4132 wrote to memory of 3924 4132 omsecor.exe 106 PID 3924 wrote to memory of 2480 3924 omsecor.exe 108 PID 3924 wrote to memory of 2480 3924 omsecor.exe 108 PID 3924 wrote to memory of 2480 3924 omsecor.exe 108 PID 2480 wrote to memory of 736 2480 omsecor.exe 110 PID 2480 wrote to memory of 736 2480 omsecor.exe 110 PID 2480 wrote to memory of 736 2480 omsecor.exe 110 PID 2480 wrote to memory of 736 2480 omsecor.exe 110 PID 2480 wrote to memory of 736 2480 omsecor.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe"C:\Users\Admin\AppData\Local\Temp\b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exeC:\Users\Admin\AppData\Local\Temp\b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 2688⤵
- Program crash
PID:4328
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 2926⤵
- Program crash
PID:1360
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 2964⤵
- Program crash
PID:3308
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 3002⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2068 -ip 20681⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1472 -ip 14721⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4132 -ip 41321⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2480 -ip 24801⤵PID:3284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a12fb481a3f0c88b513ee8b0d641eb32
SHA170fe3fd22895b1fc06ae424960c06e4e56b61a69
SHA256dde796b9c80a4c3b8b52a7be1ef601d457315d97c5d570fb487e00dce035a307
SHA512a01f97e74616e603822e25c2ccd6f278722d4e8429d4e53fbf11d8af3e3998ea1ae8d8a5af266c550a1a50ec3bf72f270cb5bc994c6caa006e663627fb9d7943
-
Filesize
96KB
MD5b24981b44a7ce916ee50d664700b36fb
SHA18021be721a8e81cc93dd12b1daf5aaf2981f81ae
SHA2565898e3aa8f9867dab01d71e51a55dc2e70de41569f9a451b14090b67448cd957
SHA5126bf7809a09d4ea8c74d9ef6cb8b4eb6aa82dd239824a593c5a4d10608076bc6c1cdf0bf9a4043da6d23b73e3657a811fb6255ee109587ef4a8f7e81fce9f5a2b
-
Filesize
96KB
MD5e08f09b767a326b345096228f52bf1ee
SHA1833382959c9321714d1da49c9b94e2abe80682db
SHA256def0a7b9ee904a4297633bcaff8344891c458426d16741f5b875067b0425d03d
SHA51278f1996b030a76a67b8decaed3352d2a2bb9dda7a12d4bc75926da00bfcbf2321460b116cad759fcde3b2a608bf1aee3c654c227ef68833223128ce5bd78bfac