Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 17:34
Static task
static1
Behavioral task
behavioral1
Sample
be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe
Resource
win7-20241010-en
General
-
Target
be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe
-
Size
96KB
-
MD5
71d0aa24a8cba1e3a97e5becbaeb7f10
-
SHA1
48ef9b13d087d475e83b8a40c5eb939283117236
-
SHA256
be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7
-
SHA512
d0e46186a50abcce9392da20db2597c04ee3b47140c9c209e332ffac754896e76a2cb6c00882e53dc4b99d1e235d86a2e6d08efa11f750bb01e550b9460a80bb
-
SSDEEP
1536:0nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:0Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4568 omsecor.exe 4740 omsecor.exe 4688 omsecor.exe 1400 omsecor.exe 4812 omsecor.exe 2264 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3420 set thread context of 4880 3420 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 83 PID 4568 set thread context of 4740 4568 omsecor.exe 87 PID 4688 set thread context of 1400 4688 omsecor.exe 109 PID 4812 set thread context of 2264 4812 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 4808 3420 WerFault.exe 82 3804 4568 WerFault.exe 85 3736 4688 WerFault.exe 108 1992 4812 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4880 3420 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 83 PID 3420 wrote to memory of 4880 3420 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 83 PID 3420 wrote to memory of 4880 3420 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 83 PID 3420 wrote to memory of 4880 3420 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 83 PID 3420 wrote to memory of 4880 3420 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 83 PID 4880 wrote to memory of 4568 4880 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 85 PID 4880 wrote to memory of 4568 4880 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 85 PID 4880 wrote to memory of 4568 4880 be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe 85 PID 4568 wrote to memory of 4740 4568 omsecor.exe 87 PID 4568 wrote to memory of 4740 4568 omsecor.exe 87 PID 4568 wrote to memory of 4740 4568 omsecor.exe 87 PID 4568 wrote to memory of 4740 4568 omsecor.exe 87 PID 4568 wrote to memory of 4740 4568 omsecor.exe 87 PID 4740 wrote to memory of 4688 4740 omsecor.exe 108 PID 4740 wrote to memory of 4688 4740 omsecor.exe 108 PID 4740 wrote to memory of 4688 4740 omsecor.exe 108 PID 4688 wrote to memory of 1400 4688 omsecor.exe 109 PID 4688 wrote to memory of 1400 4688 omsecor.exe 109 PID 4688 wrote to memory of 1400 4688 omsecor.exe 109 PID 4688 wrote to memory of 1400 4688 omsecor.exe 109 PID 4688 wrote to memory of 1400 4688 omsecor.exe 109 PID 1400 wrote to memory of 4812 1400 omsecor.exe 111 PID 1400 wrote to memory of 4812 1400 omsecor.exe 111 PID 1400 wrote to memory of 4812 1400 omsecor.exe 111 PID 4812 wrote to memory of 2264 4812 omsecor.exe 113 PID 4812 wrote to memory of 2264 4812 omsecor.exe 113 PID 4812 wrote to memory of 2264 4812 omsecor.exe 113 PID 4812 wrote to memory of 2264 4812 omsecor.exe 113 PID 4812 wrote to memory of 2264 4812 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe"C:\Users\Admin\AppData\Local\Temp\be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exeC:\Users\Admin\AppData\Local\Temp\be03c0941ff7e34645b4de85173550e6290d96d7de1004840b4a5e8233cf07e7N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4812 -s 2568⤵
- Program crash
PID:1992
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 2926⤵
- Program crash
PID:3736
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 2724⤵
- Program crash
PID:3804
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 2882⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3420 -ip 34201⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4568 -ip 45681⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4688 -ip 46881⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4812 -ip 48121⤵PID:540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56623655fbca78e9eb54b9a5ad9699800
SHA15149c518d25916b929b988aea5e3322f2ff4c39a
SHA256d90f3f6beb759b18a9152776d050f63732a1c234356797d2d7512ce05a73823a
SHA5123c7c71d0c2cc3082f9223046deff03ab221d0ad047d32d21a57775dac6ba57fb58765c621e017d5db889313b977cedfd135486429462bd047725697693ea0a28
-
Filesize
96KB
MD5d43ac77cccdab3a8b2da27d4bd874ffa
SHA13ec336ef729af67a469b8fd182e2318d03c4099b
SHA2568bbf974f9e91d3fbfd6c31e989ec19a750b9e868394ffa428034ec3727a001e4
SHA512ee7b0714cb8942d55fd8d484f95dc83f90c1462faf2ac5e5484f8505acdfa5916591645ecb54cd979a1d1950871a6fec67005891129f4189e3ce83cb830059fd
-
Filesize
96KB
MD5edc1b9ccf9388ff1891d10541bb64f12
SHA1e7d2cfc18e18d8d50b112939abc30431b5add3c8
SHA2568e9e83bc39af32cdd2a33fc32427058f5d6f589b728e55ba5bd0b5aa4754c512
SHA512cc95c9ab2901c064f0a131c5e0b231b0e518cf0c767fe30a3315cdc35cc9447ba863638e2d44086cc345d86e2fced6c3681de496652295a0255a52bb1409ab28