Analysis
-
max time kernel
110s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
Resource
win7-20241023-en
General
-
Target
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
-
Size
96KB
-
MD5
efc206b3300e3e58bcf3ca8eaca8c9cf
-
SHA1
712605a02fb689f2191342e67cb902ad52556c51
-
SHA256
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d
-
SHA512
94f0162cc032d7a8ed0924037168222936d9daeba5bd4b015850fb8c1057fd841e0cc702fd5a5c33fa02e05dca8d6977565c0482615c9a6129185f23c8d95399
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:UGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 684 omsecor.exe 4752 omsecor.exe 3552 omsecor.exe 4036 omsecor.exe 1812 omsecor.exe 1028 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3720 set thread context of 1328 3720 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 85 PID 684 set thread context of 4752 684 omsecor.exe 90 PID 3552 set thread context of 4036 3552 omsecor.exe 110 PID 1812 set thread context of 1028 1812 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3724 3720 WerFault.exe 84 4024 684 WerFault.exe 87 3124 3552 WerFault.exe 109 1572 1812 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3720 wrote to memory of 1328 3720 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 85 PID 3720 wrote to memory of 1328 3720 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 85 PID 3720 wrote to memory of 1328 3720 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 85 PID 3720 wrote to memory of 1328 3720 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 85 PID 3720 wrote to memory of 1328 3720 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 85 PID 1328 wrote to memory of 684 1328 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 87 PID 1328 wrote to memory of 684 1328 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 87 PID 1328 wrote to memory of 684 1328 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 87 PID 684 wrote to memory of 4752 684 omsecor.exe 90 PID 684 wrote to memory of 4752 684 omsecor.exe 90 PID 684 wrote to memory of 4752 684 omsecor.exe 90 PID 684 wrote to memory of 4752 684 omsecor.exe 90 PID 684 wrote to memory of 4752 684 omsecor.exe 90 PID 4752 wrote to memory of 3552 4752 omsecor.exe 109 PID 4752 wrote to memory of 3552 4752 omsecor.exe 109 PID 4752 wrote to memory of 3552 4752 omsecor.exe 109 PID 3552 wrote to memory of 4036 3552 omsecor.exe 110 PID 3552 wrote to memory of 4036 3552 omsecor.exe 110 PID 3552 wrote to memory of 4036 3552 omsecor.exe 110 PID 3552 wrote to memory of 4036 3552 omsecor.exe 110 PID 3552 wrote to memory of 4036 3552 omsecor.exe 110 PID 4036 wrote to memory of 1812 4036 omsecor.exe 112 PID 4036 wrote to memory of 1812 4036 omsecor.exe 112 PID 4036 wrote to memory of 1812 4036 omsecor.exe 112 PID 1812 wrote to memory of 1028 1812 omsecor.exe 113 PID 1812 wrote to memory of 1028 1812 omsecor.exe 113 PID 1812 wrote to memory of 1028 1812 omsecor.exe 113 PID 1812 wrote to memory of 1028 1812 omsecor.exe 113 PID 1812 wrote to memory of 1028 1812 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exeC:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 2568⤵
- Program crash
PID:1572
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3552 -s 2926⤵
- Program crash
PID:3124
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 684 -s 2884⤵
- Program crash
PID:4024
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 3042⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3720 -ip 37201⤵PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 684 -ip 6841⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3552 -ip 35521⤵PID:1088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1812 -ip 18121⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD51d17b1bd4ab36246807cc12309d15d4b
SHA10ff18ae696f550074cad1110ec2043115e80d300
SHA256aae9961fe307b22688b484b98ac25e980123913032b949f90a8cb99b92491ed5
SHA5122ecf52741aa60dc43237cfd020bf44f3596e7493192dcae9576ce57a33c77dd255b01ac43baaf5df8ac66c9370de4716d897d9142ec13881d87639abfb781246
-
Filesize
96KB
MD5f68ee74f31d1013e365ab5ce17f6a80d
SHA1855a9adb872d0e86afa7bcc5644d9cd1d504cd88
SHA2561d2e864b46c759be0946582d45a2b72e2020b7246469abdc96cb9fea7b4df94c
SHA5123d7acd7c613c2a5185132ba5388da33be1532302565d8e2a80deee6d28bb5edf72550ee299ea9db312a24311cb139c410bd7d3ccf02c705adffab99650f46194
-
Filesize
96KB
MD58470fd734c4b46b2853065d990ff3762
SHA19de3fbc06ad4c849717c4daafbe6023f59660b83
SHA25688708e6174853b74b77321410bb9081f3beadc160f94028a464f6a9ecb305614
SHA512abdbd616845ab0fa946d8962655146fd8b9ffbdb2097789881135fa1bfa71478846f87c142d7228af5d162d1481ef40fcf0af7b6acc83976817a0ee75c04044e