Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe
Resource
win7-20240729-en
General
-
Target
80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe
-
Size
96KB
-
MD5
eda6f51861aa16c7b9618049096f7a10
-
SHA1
57cdb9c23c940e2c381f72ba5dd11b8d30b7ccd9
-
SHA256
80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4
-
SHA512
cd03f1ae3602caeebdd635f8f48b810aeec5d9a4c1f87bf6d1d12d8209072a8bde1a355540ab36f4676895d8d615dc02c549ccffff92363f62d03687735a3947
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:zGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3664 omsecor.exe 2228 omsecor.exe 4056 omsecor.exe 4740 omsecor.exe 2472 omsecor.exe 4104 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3252 set thread context of 2356 3252 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 83 PID 3664 set thread context of 2228 3664 omsecor.exe 88 PID 4056 set thread context of 4740 4056 omsecor.exe 109 PID 2472 set thread context of 4104 2472 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 2192 3252 WerFault.exe 82 3372 3664 WerFault.exe 85 5084 4056 WerFault.exe 108 4176 2472 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3252 wrote to memory of 2356 3252 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 83 PID 3252 wrote to memory of 2356 3252 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 83 PID 3252 wrote to memory of 2356 3252 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 83 PID 3252 wrote to memory of 2356 3252 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 83 PID 3252 wrote to memory of 2356 3252 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 83 PID 2356 wrote to memory of 3664 2356 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 85 PID 2356 wrote to memory of 3664 2356 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 85 PID 2356 wrote to memory of 3664 2356 80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe 85 PID 3664 wrote to memory of 2228 3664 omsecor.exe 88 PID 3664 wrote to memory of 2228 3664 omsecor.exe 88 PID 3664 wrote to memory of 2228 3664 omsecor.exe 88 PID 3664 wrote to memory of 2228 3664 omsecor.exe 88 PID 3664 wrote to memory of 2228 3664 omsecor.exe 88 PID 2228 wrote to memory of 4056 2228 omsecor.exe 108 PID 2228 wrote to memory of 4056 2228 omsecor.exe 108 PID 2228 wrote to memory of 4056 2228 omsecor.exe 108 PID 4056 wrote to memory of 4740 4056 omsecor.exe 109 PID 4056 wrote to memory of 4740 4056 omsecor.exe 109 PID 4056 wrote to memory of 4740 4056 omsecor.exe 109 PID 4056 wrote to memory of 4740 4056 omsecor.exe 109 PID 4056 wrote to memory of 4740 4056 omsecor.exe 109 PID 4740 wrote to memory of 2472 4740 omsecor.exe 111 PID 4740 wrote to memory of 2472 4740 omsecor.exe 111 PID 4740 wrote to memory of 2472 4740 omsecor.exe 111 PID 2472 wrote to memory of 4104 2472 omsecor.exe 113 PID 2472 wrote to memory of 4104 2472 omsecor.exe 113 PID 2472 wrote to memory of 4104 2472 omsecor.exe 113 PID 2472 wrote to memory of 4104 2472 omsecor.exe 113 PID 2472 wrote to memory of 4104 2472 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe"C:\Users\Admin\AppData\Local\Temp\80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exeC:\Users\Admin\AppData\Local\Temp\80d9454386ae597cebff0a0007cba53f5b349947e8cdbb28cc39757a8c8a25e4N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 2568⤵
- Program crash
PID:4176
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 2926⤵
- Program crash
PID:5084
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 2644⤵
- Program crash
PID:3372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 2882⤵
- Program crash
PID:2192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3252 -ip 32521⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3664 -ip 36641⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4056 -ip 40561⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2472 -ip 24721⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD550bbe296be7ab48789dd69428a4978e8
SHA191508fd706580d0ec6f2d1db1064a31d3a53ed19
SHA25676d2e8b617d762efc127d8e0b2492e5814bb4befb0b5d6b63f6d9090d4384d59
SHA51227139e9c08f590b0001596369da8f3b79c4335db36eb2622c2d1319f2bc388e0e9af0d50dafe834f8a1ca901fe1ccf39f8d55573bfc3d5e4705bdb92a02c0414
-
Filesize
96KB
MD5a41f48c54207c078dc11db4348587adb
SHA1db2276dc41a503b9c37c4107631a8d437bd9d063
SHA256e76d99738414ffdf3d4686163e748a6194454ffc3991d7b35541e9c78dffe9cb
SHA512109842297b5303f8b1274fe4333ebe8de513cfc424649dd09952cae452114b1d251a63c5865948e5946bd79162f5fadfefcea95ee3b9fca4e4466c18677c3bbd
-
Filesize
96KB
MD51c986cd47155e22611463fb1aff2a120
SHA15aa01985d60552c64a5bc2df126b25be35c230a7
SHA2568be142f80117f3508d3eaea3c3dec4a52b3d6ed35de999dddc3cc43d46ab005c
SHA512f5117cce5efe1143fbe6ae43af38f72939f9273d06083a1da62667176541fb7c22ed3673532aadf4f3648a6de5ed2595b4775734974d31caffe0e3bb80768531