Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe
Resource
win7-20240903-en
General
-
Target
b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe
-
Size
134KB
-
MD5
b94b47d7d5e2f2ebfe6016e80093b3ca
-
SHA1
a6710d18bc197b67b0f43e9f1781ac52ff263466
-
SHA256
b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d
-
SHA512
3e13700b76190934efacde18628621d6438bcb249b54c214fd14606785357018e8a12a57438602357034b4bb59d4b992184e9306238ce805382ced26ae990efc
-
SSDEEP
1536:qDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:MiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4260 omsecor.exe 3060 omsecor.exe 3988 omsecor.exe 1616 omsecor.exe 3896 omsecor.exe 3108 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4752 set thread context of 3640 4752 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 82 PID 4260 set thread context of 3060 4260 omsecor.exe 87 PID 3988 set thread context of 1616 3988 omsecor.exe 100 PID 3896 set thread context of 3108 3896 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 216 4752 WerFault.exe 81 2424 4260 WerFault.exe 85 5008 3988 WerFault.exe 99 4336 3896 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4752 wrote to memory of 3640 4752 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 82 PID 4752 wrote to memory of 3640 4752 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 82 PID 4752 wrote to memory of 3640 4752 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 82 PID 4752 wrote to memory of 3640 4752 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 82 PID 4752 wrote to memory of 3640 4752 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 82 PID 3640 wrote to memory of 4260 3640 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 85 PID 3640 wrote to memory of 4260 3640 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 85 PID 3640 wrote to memory of 4260 3640 b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe 85 PID 4260 wrote to memory of 3060 4260 omsecor.exe 87 PID 4260 wrote to memory of 3060 4260 omsecor.exe 87 PID 4260 wrote to memory of 3060 4260 omsecor.exe 87 PID 4260 wrote to memory of 3060 4260 omsecor.exe 87 PID 4260 wrote to memory of 3060 4260 omsecor.exe 87 PID 3060 wrote to memory of 3988 3060 omsecor.exe 99 PID 3060 wrote to memory of 3988 3060 omsecor.exe 99 PID 3060 wrote to memory of 3988 3060 omsecor.exe 99 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 3988 wrote to memory of 1616 3988 omsecor.exe 100 PID 1616 wrote to memory of 3896 1616 omsecor.exe 102 PID 1616 wrote to memory of 3896 1616 omsecor.exe 102 PID 1616 wrote to memory of 3896 1616 omsecor.exe 102 PID 3896 wrote to memory of 3108 3896 omsecor.exe 104 PID 3896 wrote to memory of 3108 3896 omsecor.exe 104 PID 3896 wrote to memory of 3108 3896 omsecor.exe 104 PID 3896 wrote to memory of 3108 3896 omsecor.exe 104 PID 3896 wrote to memory of 3108 3896 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe"C:\Users\Admin\AppData\Local\Temp\b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exeC:\Users\Admin\AppData\Local\Temp\b1eb0786518247adf3e6e612ea69e7677036d4004b61496680626e058e495a2d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 2448⤵
- Program crash
PID:4336
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 2926⤵
- Program crash
PID:5008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 3004⤵
- Program crash
PID:2424
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 3002⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4752 -ip 47521⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4260 -ip 42601⤵PID:1288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3988 -ip 39881⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3896 -ip 38961⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD583be1fe6770f40721ef9a199ae1057e3
SHA10ee720465c7a2b6c92dc4147ec68dd59a22fe24d
SHA256a28d81d49ada49993ec29c4babdfa9c6a9c933eb341587ee070e70b9cb1fe317
SHA512eb6cf3e188443078ecbf1e40011546c720a53511a040d5f9cf38a1e6ce584c28e32709d4808dcb488402ca54bd9746e40a11a724f0e0453fe8e710f2f4272210
-
Filesize
134KB
MD5e23920203856afadcb9d673c4e798a11
SHA10dbb4ef848104324903578c0cda156c79ad7aa57
SHA256c15af5504c71a3b7e787e098871303c1b0458a298465cfe7a7cd97b7fec1a6e5
SHA5128d55033484381a0390e9bcfc216bd516f1b4fd4b70f7296e776819144738fe6a969479e232e286b126720f03a0428a88c570a2dfd13cc379bdb6b5ddd432842d
-
Filesize
134KB
MD5e70f464a72f4ee79db7a593da360cefc
SHA1a8b2681116f5db3646ea459434ee95ce1a756025
SHA25671b970ab01e61764945deade671d760745ad2577909ccb4b4e01db6898ec07c1
SHA51234b240886faa6fd53ee58b59b66dabc7b0f8568ef131feb2e5662e65d6edf655ee34d1649aa8065f7ce06d514920fe85dbb4f678911b9de774f3ab984c609f23