Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 23:32
Static task
static1
Behavioral task
behavioral1
Sample
6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe
Resource
win7-20240903-en
General
-
Target
6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe
-
Size
96KB
-
MD5
83f7b311b9ecda871573dcf6e7440124
-
SHA1
0416d1d3ca34bc17eea652db45f47e492ce0afb0
-
SHA256
6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c
-
SHA512
9305f3e807816b7f333b183b1b2887798f2cde555c99a50915c75f5de4121c9647888ea7d49e300834904e72126e537ed5f62b249d8f08e234255588f8a62e79
-
SSDEEP
1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxa:jGs8cd8eXlYairZYqMddH13a
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4900 omsecor.exe 3748 omsecor.exe 1924 omsecor.exe 4936 omsecor.exe 4496 omsecor.exe 3760 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1616 set thread context of 2740 1616 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 83 PID 4900 set thread context of 3748 4900 omsecor.exe 87 PID 1924 set thread context of 4936 1924 omsecor.exe 110 PID 4496 set thread context of 3760 4496 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 1820 1616 WerFault.exe 82 4812 4900 WerFault.exe 85 216 1924 WerFault.exe 109 1136 4496 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2740 1616 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 83 PID 1616 wrote to memory of 2740 1616 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 83 PID 1616 wrote to memory of 2740 1616 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 83 PID 1616 wrote to memory of 2740 1616 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 83 PID 1616 wrote to memory of 2740 1616 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 83 PID 2740 wrote to memory of 4900 2740 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 85 PID 2740 wrote to memory of 4900 2740 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 85 PID 2740 wrote to memory of 4900 2740 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 85 PID 4900 wrote to memory of 3748 4900 omsecor.exe 87 PID 4900 wrote to memory of 3748 4900 omsecor.exe 87 PID 4900 wrote to memory of 3748 4900 omsecor.exe 87 PID 4900 wrote to memory of 3748 4900 omsecor.exe 87 PID 4900 wrote to memory of 3748 4900 omsecor.exe 87 PID 3748 wrote to memory of 1924 3748 omsecor.exe 109 PID 3748 wrote to memory of 1924 3748 omsecor.exe 109 PID 3748 wrote to memory of 1924 3748 omsecor.exe 109 PID 1924 wrote to memory of 4936 1924 omsecor.exe 110 PID 1924 wrote to memory of 4936 1924 omsecor.exe 110 PID 1924 wrote to memory of 4936 1924 omsecor.exe 110 PID 1924 wrote to memory of 4936 1924 omsecor.exe 110 PID 1924 wrote to memory of 4936 1924 omsecor.exe 110 PID 4936 wrote to memory of 4496 4936 omsecor.exe 112 PID 4936 wrote to memory of 4496 4936 omsecor.exe 112 PID 4936 wrote to memory of 4496 4936 omsecor.exe 112 PID 4496 wrote to memory of 3760 4496 omsecor.exe 113 PID 4496 wrote to memory of 3760 4496 omsecor.exe 113 PID 4496 wrote to memory of 3760 4496 omsecor.exe 113 PID 4496 wrote to memory of 3760 4496 omsecor.exe 113 PID 4496 wrote to memory of 3760 4496 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe"C:\Users\Admin\AppData\Local\Temp\6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exeC:\Users\Admin\AppData\Local\Temp\6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 2568⤵
- Program crash
PID:1136
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 2926⤵
- Program crash
PID:216
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 2884⤵
- Program crash
PID:4812
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2882⤵
- Program crash
PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1616 -ip 16161⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4900 -ip 49001⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1924 -ip 19241⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4496 -ip 44961⤵PID:1016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5201cf086ab9a6b069206cfcf6108098e
SHA1ecab4b82f64ad8f9253ae450f61614fb18b9bc97
SHA256bde35d9927cff235f5627ad5a79d5be6bd44cff1da0d47d2f7a2f07335c4e9cf
SHA51298cf3bdfe682bc44565ab3239593a2ad6f932c4daeab8283f77135ba63bc68d36e97f85faf0a05382c0d5929cc515a73a24e89f49b4c91684df68c76f6b72fca
-
Filesize
96KB
MD5d5b78477f5e09b3f066598c50c7223c7
SHA12d413f16a0a80825b60bb9f8bec0328c85750652
SHA256a67acd902fefe91943234d5bb633741c178006f52a8d4df83df346d4ab3cb653
SHA512febec632115bc7e96e8c0c8e9f0c142bb1512d84f54639e8c6c9bdac6214abccd4f698c8ced156fca3afa5efc9b9cd5dc9fcdc4dfe75cba2ee5e366dda282d19
-
Filesize
96KB
MD58bc693a9a52d6100937fe63bba2be92a
SHA1b16ab7b439c34b154b370a88c67320d514e7c580
SHA25633828d84e42a453931d1167eec500c5266b813e56d0dce855452c359f26cbf24
SHA51288fe3962b6882f6cf90afb423e28abe1901bb0a68643b1afe890e5f60833c9a62d7a0a5dbe825994f4ebdd3ec6ab1a15adc8ae204bc54df3bc6f6aaf3a77216f