Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe
Resource
win7-20240903-en
General
-
Target
07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe
-
Size
96KB
-
MD5
a330bd3ac7399c97c8f0853c3d7f0570
-
SHA1
513758fdc74147414ffc9f2a883967284e071b82
-
SHA256
07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428f
-
SHA512
ab784c6b140f313b9a6c7ea93eea4ce4dcc45c0ede881422e39809fd7a36e27b0f2a3d8ea4c30c9cc2e1eb2fcfbee442bf480e0692c0103405e195ea0903859e
-
SSDEEP
1536:XnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:XGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4708 omsecor.exe 4868 omsecor.exe 3548 omsecor.exe 2956 omsecor.exe 2492 omsecor.exe 2920 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3852 set thread context of 2320 3852 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 82 PID 4708 set thread context of 4868 4708 omsecor.exe 87 PID 3548 set thread context of 2956 3548 omsecor.exe 100 PID 2492 set thread context of 2920 2492 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4108 3852 WerFault.exe 81 4148 4708 WerFault.exe 84 1168 3548 WerFault.exe 99 5080 2492 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3852 wrote to memory of 2320 3852 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 82 PID 3852 wrote to memory of 2320 3852 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 82 PID 3852 wrote to memory of 2320 3852 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 82 PID 3852 wrote to memory of 2320 3852 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 82 PID 3852 wrote to memory of 2320 3852 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 82 PID 2320 wrote to memory of 4708 2320 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 84 PID 2320 wrote to memory of 4708 2320 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 84 PID 2320 wrote to memory of 4708 2320 07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe 84 PID 4708 wrote to memory of 4868 4708 omsecor.exe 87 PID 4708 wrote to memory of 4868 4708 omsecor.exe 87 PID 4708 wrote to memory of 4868 4708 omsecor.exe 87 PID 4708 wrote to memory of 4868 4708 omsecor.exe 87 PID 4708 wrote to memory of 4868 4708 omsecor.exe 87 PID 4868 wrote to memory of 3548 4868 omsecor.exe 99 PID 4868 wrote to memory of 3548 4868 omsecor.exe 99 PID 4868 wrote to memory of 3548 4868 omsecor.exe 99 PID 3548 wrote to memory of 2956 3548 omsecor.exe 100 PID 3548 wrote to memory of 2956 3548 omsecor.exe 100 PID 3548 wrote to memory of 2956 3548 omsecor.exe 100 PID 3548 wrote to memory of 2956 3548 omsecor.exe 100 PID 3548 wrote to memory of 2956 3548 omsecor.exe 100 PID 2956 wrote to memory of 2492 2956 omsecor.exe 102 PID 2956 wrote to memory of 2492 2956 omsecor.exe 102 PID 2956 wrote to memory of 2492 2956 omsecor.exe 102 PID 2492 wrote to memory of 2920 2492 omsecor.exe 104 PID 2492 wrote to memory of 2920 2492 omsecor.exe 104 PID 2492 wrote to memory of 2920 2492 omsecor.exe 104 PID 2492 wrote to memory of 2920 2492 omsecor.exe 104 PID 2492 wrote to memory of 2920 2492 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe"C:\Users\Admin\AppData\Local\Temp\07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exeC:\Users\Admin\AppData\Local\Temp\07a277f638c29d338001cba09d14f4eb82f4c21c3263de2e53f191e09c85428fN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2568⤵
- Program crash
PID:5080
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 2926⤵
- Program crash
PID:1168
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 3004⤵
- Program crash
PID:4148
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 2882⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3852 -ip 38521⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4708 -ip 47081⤵PID:1176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3548 -ip 35481⤵PID:656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2492 -ip 24921⤵PID:4140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5cad6cc128b4323f82a58180b0d3090a2
SHA1d9e7eb4d89c5716da135da19d99445f64abfca1a
SHA256aa6560c66a71cac992a315273a82872e70c2a0fbe0103f5ed83069d81b59a647
SHA51277e0cb4bbb28317bd2049c8e5b5781b58352ca391d6d84bf7c779fc5d1519542450489d1f7cb925a64bd235dbbb7b64251c58dbc047da3e35e1efeccecabf377
-
Filesize
96KB
MD5709f9640cde5fea9296f4496745f3ab4
SHA160b0afe8624cd1d885f1d996c86bdd01d4365b0a
SHA25615e37e5875c669e29fae517ea6d653e86f8a5ec2514b0f6cc4e9925859fcd9b5
SHA51298470bd948d42652ac1c44c4be865da3e9374c59d7fe742f2054e794c61fbb29dc95da21a2861b9f950beb00ea88bc2d34c88b99912b2c95e5680fa61c69f314
-
Filesize
96KB
MD56a8cc7b592bfea41216dcc86c31f9840
SHA1daba226e8744bb21c3e6f412c4026254f90ef6e4
SHA256d844b8eef552169f118fd7ce3143d5168a30ba3e942cdb4622a560714ed452ba
SHA5128426625d9c0c6b7e402acdb15facfdcaa3698c117904132458bbf6bfe36a7b6ae7b310ddcdfc9bed3626ee621351b1c0e1c7205971b85e951503b2bfb29b5507