Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe
Resource
win7-20240708-en
General
-
Target
89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe
-
Size
96KB
-
MD5
e10b3a7a7069066eed78dadc8378cde7
-
SHA1
537f76364cb78e9b7a5d569a0eb0c02c7b20904e
-
SHA256
89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25
-
SHA512
9c42fc40335ee2169192235f6cd1c66dc0714facd9d76baa70c4076a43147bcc3bd36c1cd0065d381162cd8452eb77bd018d12c11fff35da8bb205e2f39ccc87
-
SSDEEP
1536:YnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:YGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 816 omsecor.exe 4196 omsecor.exe 1532 omsecor.exe 1524 omsecor.exe 4112 omsecor.exe 4976 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3816 set thread context of 3976 3816 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 84 PID 816 set thread context of 4196 816 omsecor.exe 88 PID 1532 set thread context of 1524 1532 omsecor.exe 109 PID 4112 set thread context of 4976 4112 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 2688 3816 WerFault.exe 83 4432 816 WerFault.exe 87 1136 1532 WerFault.exe 108 1664 4112 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3816 wrote to memory of 3976 3816 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 84 PID 3816 wrote to memory of 3976 3816 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 84 PID 3816 wrote to memory of 3976 3816 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 84 PID 3816 wrote to memory of 3976 3816 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 84 PID 3816 wrote to memory of 3976 3816 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 84 PID 3976 wrote to memory of 816 3976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 87 PID 3976 wrote to memory of 816 3976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 87 PID 3976 wrote to memory of 816 3976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 87 PID 816 wrote to memory of 4196 816 omsecor.exe 88 PID 816 wrote to memory of 4196 816 omsecor.exe 88 PID 816 wrote to memory of 4196 816 omsecor.exe 88 PID 816 wrote to memory of 4196 816 omsecor.exe 88 PID 816 wrote to memory of 4196 816 omsecor.exe 88 PID 4196 wrote to memory of 1532 4196 omsecor.exe 108 PID 4196 wrote to memory of 1532 4196 omsecor.exe 108 PID 4196 wrote to memory of 1532 4196 omsecor.exe 108 PID 1532 wrote to memory of 1524 1532 omsecor.exe 109 PID 1532 wrote to memory of 1524 1532 omsecor.exe 109 PID 1532 wrote to memory of 1524 1532 omsecor.exe 109 PID 1532 wrote to memory of 1524 1532 omsecor.exe 109 PID 1532 wrote to memory of 1524 1532 omsecor.exe 109 PID 1524 wrote to memory of 4112 1524 omsecor.exe 111 PID 1524 wrote to memory of 4112 1524 omsecor.exe 111 PID 1524 wrote to memory of 4112 1524 omsecor.exe 111 PID 4112 wrote to memory of 4976 4112 omsecor.exe 113 PID 4112 wrote to memory of 4976 4112 omsecor.exe 113 PID 4112 wrote to memory of 4976 4112 omsecor.exe 113 PID 4112 wrote to memory of 4976 4112 omsecor.exe 113 PID 4112 wrote to memory of 4976 4112 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe"C:\Users\Admin\AppData\Local\Temp\89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exeC:\Users\Admin\AppData\Local\Temp\89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4112 -s 2688⤵
- Program crash
PID:1664
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 2926⤵
- Program crash
PID:1136
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 2884⤵
- Program crash
PID:4432
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 2882⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3816 -ip 38161⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 816 -ip 8161⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1532 -ip 15321⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4112 -ip 41121⤵PID:1764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD575083482f60da84c431e07f5c04b0b2a
SHA1ab79667e58ed9adb1968a74ca5a8491c7bdc0241
SHA2568b82bd93d045be5600e32181b017b55d4c3ab6e14a06a7d6c61534232547e0c2
SHA512447e77cbba1a5eea341a3fea2c23242d7d378c6df195e617ea2851c791573346762cb61b15c0c0c66c5bde88ec402949c13fb57e94d623a3d36afa10e202e3ff
-
Filesize
96KB
MD59ae7a66c72a4e951e218a9cb633935a2
SHA1b78aa8282064b037adf8e327a984d8ba39b6c962
SHA2562acc161e874e963410fae6c1742cf30b0a304ad24a1eb7f60aca8e0207db35d3
SHA5129a9280d66a94340d53c0664027b9f1a38defa83631ef98fdf16ea6625067252e85f60618f52b01407679409eda0769dd764d5a228a539c08678cc43ccd41fcea
-
Filesize
96KB
MD5521f12d79ad008f3e6cb69de72004fad
SHA1c4eedb62e8f21baf3d6a34b8bd4b00a55cf06557
SHA25678764833516ae6d8c3a001fd74ee035757c4f482c82154500276679fe8391301
SHA5120c5b05fcfd5df7118dcedc096734219a55342ad84521a4221f92b6baf89deccd13a8786c90ada6fdc86511218e67e41182f7f33744b8b3ae563f1ad1b23e5d74