Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
Resource
win7-20240708-en
General
-
Target
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
-
Size
96KB
-
MD5
efc206b3300e3e58bcf3ca8eaca8c9cf
-
SHA1
712605a02fb689f2191342e67cb902ad52556c51
-
SHA256
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d
-
SHA512
94f0162cc032d7a8ed0924037168222936d9daeba5bd4b015850fb8c1057fd841e0cc702fd5a5c33fa02e05dca8d6977565c0482615c9a6129185f23c8d95399
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:UGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 228 omsecor.exe 4656 omsecor.exe 1860 omsecor.exe 2440 omsecor.exe 4376 omsecor.exe 1140 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3752 set thread context of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 228 set thread context of 4656 228 omsecor.exe 87 PID 1860 set thread context of 2440 1860 omsecor.exe 108 PID 4376 set thread context of 1140 4376 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 396 3752 WerFault.exe 82 2004 228 WerFault.exe 86 2996 1860 WerFault.exe 107 2612 4376 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 2944 wrote to memory of 228 2944 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 86 PID 2944 wrote to memory of 228 2944 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 86 PID 2944 wrote to memory of 228 2944 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 86 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 4656 wrote to memory of 1860 4656 omsecor.exe 107 PID 4656 wrote to memory of 1860 4656 omsecor.exe 107 PID 4656 wrote to memory of 1860 4656 omsecor.exe 107 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 2440 wrote to memory of 4376 2440 omsecor.exe 110 PID 2440 wrote to memory of 4376 2440 omsecor.exe 110 PID 2440 wrote to memory of 4376 2440 omsecor.exe 110 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exeC:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 2568⤵
- Program crash
PID:2612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 2926⤵
- Program crash
PID:2996
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 3004⤵
- Program crash
PID:2004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 2882⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3752 -ip 37521⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 228 -ip 2281⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1860 -ip 18601⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4376 -ip 43761⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5fc78e4015ef026712b9fc22f7f5408ba
SHA1ddfcebb6cbe4b9a05fdada499dffaa44a7d367f4
SHA256ab85b48900f104daf368a1fe1894122a653e9db0a7b1bbc4929832dcf4ee61ca
SHA5125ac2d4de07fdd0539cb45603eb89cee3e538cc5a0e6ab0a02ba3b458df1bd97de38d213dfb199086e666d7306c11f437b812f6455222a01e4e48e7bcd5a874a8
-
Filesize
96KB
MD5f68ee74f31d1013e365ab5ce17f6a80d
SHA1855a9adb872d0e86afa7bcc5644d9cd1d504cd88
SHA2561d2e864b46c759be0946582d45a2b72e2020b7246469abdc96cb9fea7b4df94c
SHA5123d7acd7c613c2a5185132ba5388da33be1532302565d8e2a80deee6d28bb5edf72550ee299ea9db312a24311cb139c410bd7d3ccf02c705adffab99650f46194
-
Filesize
96KB
MD54894333d751ca2735ce7989d41b0494c
SHA1bb6cfd92c012187bee52d826987723e48814b231
SHA256cdf8085ada94a11621701cea5ff45086ed89af703050ee00933547ceed44438c
SHA5128fdd02f6df78a21982b69036b52db5daf736af496c46faa55d630d612b178a62702426722bd92505d292f259766e2f7ba8b091c30318e3794c1dbc97ffc4e708