Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe
Resource
win7-20240708-en
General
-
Target
d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe
-
Size
134KB
-
MD5
e6c8b2ebde224a97b946084aa466a5a0
-
SHA1
08540d457b47b3971d99f91e08070a5838c71d0b
-
SHA256
d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7
-
SHA512
8e2b539db918ffc9d19c0032d190413b013842475183749a273212f85cf9316ae65608437ba0fae35e0a256450e0b4d892cf2d02d6d598f4a31ced262762598e
-
SSDEEP
1536:PDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:7iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4480 omsecor.exe 2768 omsecor.exe 3876 omsecor.exe 3988 omsecor.exe 4136 omsecor.exe 544 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5116 set thread context of 4212 5116 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 82 PID 4480 set thread context of 2768 4480 omsecor.exe 87 PID 3876 set thread context of 3988 3876 omsecor.exe 100 PID 4136 set thread context of 544 4136 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 828 5116 WerFault.exe 81 2552 4480 WerFault.exe 84 1048 3876 WerFault.exe 99 920 4136 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5116 wrote to memory of 4212 5116 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 82 PID 5116 wrote to memory of 4212 5116 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 82 PID 5116 wrote to memory of 4212 5116 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 82 PID 5116 wrote to memory of 4212 5116 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 82 PID 5116 wrote to memory of 4212 5116 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 82 PID 4212 wrote to memory of 4480 4212 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 84 PID 4212 wrote to memory of 4480 4212 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 84 PID 4212 wrote to memory of 4480 4212 d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe 84 PID 4480 wrote to memory of 2768 4480 omsecor.exe 87 PID 4480 wrote to memory of 2768 4480 omsecor.exe 87 PID 4480 wrote to memory of 2768 4480 omsecor.exe 87 PID 4480 wrote to memory of 2768 4480 omsecor.exe 87 PID 4480 wrote to memory of 2768 4480 omsecor.exe 87 PID 2768 wrote to memory of 3876 2768 omsecor.exe 99 PID 2768 wrote to memory of 3876 2768 omsecor.exe 99 PID 2768 wrote to memory of 3876 2768 omsecor.exe 99 PID 3876 wrote to memory of 3988 3876 omsecor.exe 100 PID 3876 wrote to memory of 3988 3876 omsecor.exe 100 PID 3876 wrote to memory of 3988 3876 omsecor.exe 100 PID 3876 wrote to memory of 3988 3876 omsecor.exe 100 PID 3876 wrote to memory of 3988 3876 omsecor.exe 100 PID 3988 wrote to memory of 4136 3988 omsecor.exe 102 PID 3988 wrote to memory of 4136 3988 omsecor.exe 102 PID 3988 wrote to memory of 4136 3988 omsecor.exe 102 PID 4136 wrote to memory of 544 4136 omsecor.exe 104 PID 4136 wrote to memory of 544 4136 omsecor.exe 104 PID 4136 wrote to memory of 544 4136 omsecor.exe 104 PID 4136 wrote to memory of 544 4136 omsecor.exe 104 PID 4136 wrote to memory of 544 4136 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe"C:\Users\Admin\AppData\Local\Temp\d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exeC:\Users\Admin\AppData\Local\Temp\d7a34071cf9f2ea779befb789917ee38e56db1b14d3ec0faa8a013c87fbd38e7N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 2568⤵
- Program crash
PID:920
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 2926⤵
- Program crash
PID:1048
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 2884⤵
- Program crash
PID:2552
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 2322⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5116 -ip 51161⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4480 -ip 44801⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3876 -ip 38761⤵PID:1388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4136 -ip 41361⤵PID:3744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD503cff67c142602ad722d4180504d31a8
SHA16a7511775a7cdf7e5708036a129a2e76ee1a94d9
SHA2565bfa1c0cf7555e93dddca11ea8b760f6dcb462bf52070dfa81dc626e30e7217c
SHA5120df73b632170706d512252c018a52c46e74ab3509d809e8696a31604a2286380ed5e28c9748b1e171788c8db6971480e32a4e60bed028bf783dca38db9190b10
-
Filesize
134KB
MD5cbd52831c31bd135a9a8bb3870d95324
SHA1c7e121c72585efa95d357453129d0c28743f8652
SHA25671bc5eecdf6e6f29523ca5c6aef193a97227d9fc6432097de8aefcab5ef96c87
SHA5123dab0584670134002ddba3d939e701ca6c8bcf439f4b8578dcf9009c05bd58dbeef949726ec04701b4ca6b28a1bd1588780d7a70520ea1347d20720e1427f6b1
-
Filesize
134KB
MD54e15dfc77ff5677b7b599810df39336c
SHA1d964e5f47a015b88f9915e8a54cf8e2b9b2c4a43
SHA2562c01b8c0ce2d7b6f3fdf6dd0148d31c3d460a92b2b6057fc31f777ad930aad36
SHA51248cb232aef2abc498d4fdb91a4e79a35110021c899033017af140d86125cd2def073efe1bb5ea3c25d86a811dc82b0c7fac1b118764eb04570ffbb4f7d141bd5