Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe
Resource
win7-20240903-en
General
-
Target
5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe
-
Size
96KB
-
MD5
b68f49ecd7ced38a0036962cdefc7370
-
SHA1
2506566a81706d4432705bb7ea662bb4bc5b66cb
-
SHA256
5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825
-
SHA512
5a712b5a0b1782a95ef26d206872a3f27f5f1fea9f1939284e834fcceb55175d32350059d630d59ca19ce8e9164419a9930c60f5b9b02c58ae753ee216398ba7
-
SSDEEP
1536:snAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:sGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1672 omsecor.exe 1996 omsecor.exe 1920 omsecor.exe 4972 omsecor.exe 2076 omsecor.exe 1476 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3736 set thread context of 4660 3736 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 83 PID 1672 set thread context of 1996 1672 omsecor.exe 87 PID 1920 set thread context of 4972 1920 omsecor.exe 108 PID 2076 set thread context of 1476 2076 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 2916 3736 WerFault.exe 82 4216 1672 WerFault.exe 86 2916 1920 WerFault.exe 107 2384 2076 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4660 3736 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 83 PID 3736 wrote to memory of 4660 3736 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 83 PID 3736 wrote to memory of 4660 3736 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 83 PID 3736 wrote to memory of 4660 3736 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 83 PID 3736 wrote to memory of 4660 3736 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 83 PID 4660 wrote to memory of 1672 4660 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 86 PID 4660 wrote to memory of 1672 4660 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 86 PID 4660 wrote to memory of 1672 4660 5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe 86 PID 1672 wrote to memory of 1996 1672 omsecor.exe 87 PID 1672 wrote to memory of 1996 1672 omsecor.exe 87 PID 1672 wrote to memory of 1996 1672 omsecor.exe 87 PID 1672 wrote to memory of 1996 1672 omsecor.exe 87 PID 1672 wrote to memory of 1996 1672 omsecor.exe 87 PID 1996 wrote to memory of 1920 1996 omsecor.exe 107 PID 1996 wrote to memory of 1920 1996 omsecor.exe 107 PID 1996 wrote to memory of 1920 1996 omsecor.exe 107 PID 1920 wrote to memory of 4972 1920 omsecor.exe 108 PID 1920 wrote to memory of 4972 1920 omsecor.exe 108 PID 1920 wrote to memory of 4972 1920 omsecor.exe 108 PID 1920 wrote to memory of 4972 1920 omsecor.exe 108 PID 1920 wrote to memory of 4972 1920 omsecor.exe 108 PID 4972 wrote to memory of 2076 4972 omsecor.exe 110 PID 4972 wrote to memory of 2076 4972 omsecor.exe 110 PID 4972 wrote to memory of 2076 4972 omsecor.exe 110 PID 2076 wrote to memory of 1476 2076 omsecor.exe 112 PID 2076 wrote to memory of 1476 2076 omsecor.exe 112 PID 2076 wrote to memory of 1476 2076 omsecor.exe 112 PID 2076 wrote to memory of 1476 2076 omsecor.exe 112 PID 2076 wrote to memory of 1476 2076 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe"C:\Users\Admin\AppData\Local\Temp\5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exeC:\Users\Admin\AppData\Local\Temp\5f21c755308d6f97c3e2c728919674b97e1a8aa1bdc1ac7cbff65f84833cd825N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 2568⤵
- Program crash
PID:2384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 2926⤵
- Program crash
PID:2916
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 2764⤵
- Program crash
PID:4216
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 2882⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3736 -ip 37361⤵PID:1540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1672 -ip 16721⤵PID:1396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1920 -ip 19201⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2076 -ip 20761⤵PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD584d33ac4981657b8cebf6ed67c718b27
SHA1d46794bfa78db728218e9f140b82af433a8d472a
SHA2568fdfc9a654ff4fce83be06df8417a7c4bec9f3eaa84e871ccc61bfd3ac25547a
SHA51252a074d76b71ab70ba547e3d0e61bf2da77590bf7104fbca3b9dacc7b5e3a77d081735f3994cbb1b2a6d55c031d4e06ceadf847d42cc218cf3902386451b1a71
-
Filesize
96KB
MD5907a8dc35445936cd31d0f26eba9481f
SHA18af3dc64ea78d61d71b8eea3e3cb575d4edf37d4
SHA25652b79c15a7f78ce008fd55daec1bc55cf6210ec3c349fff6f780d12a233e7150
SHA51269e8c117258bceee4813454a973608ffdd76d1b05585382163b3455bb8ced111c6724d8e8130660ba4a2e0e699e5da260149c8acc7f5becbea08ee4860d75e99
-
Filesize
96KB
MD5e7d7f3a3b87ddaac5c8bf946bbdb40ab
SHA13ef54bf6d5141ca8b1431c593a8f862a82df0e20
SHA25657790981271281b1df6749df41fc37508e4cd6245f92070dbb21cf493be7af60
SHA5121308df66d0ea023fdc7583af2735b5279402f0dcd1c39c145e50d02e3fcae2353102cfc3b998ced074c204992949649f9a60335412d8aa16582543fe59e64c6f