Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe
Resource
win7-20240903-en
General
-
Target
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe
-
Size
134KB
-
MD5
99f410fed3e2f4cd72d4f981b889e7bc
-
SHA1
76b150567a0e0abe420674417fdfb05fd8cef31c
-
SHA256
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f
-
SHA512
ba78db0e847cef3fed4fa46be2d74809ab8818beee1e1943318ae3121df71dc8edae15ba16d793bdbeeb92e7051e5a8c6d74918e32d06c2219ba0b03e13e8d27
-
SSDEEP
1536:DDfDbhERTatPLTH0NqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwC7l:PiRTeH0NqAW6J6f1tqF6dngNmaZC7Mc
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3140 omsecor.exe 1832 omsecor.exe 4408 omsecor.exe 3544 omsecor.exe 680 omsecor.exe 3996 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4944 set thread context of 3724 4944 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 83 PID 3140 set thread context of 1832 3140 omsecor.exe 87 PID 4408 set thread context of 3544 4408 omsecor.exe 109 PID 680 set thread context of 3996 680 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 1148 4944 WerFault.exe 82 1596 3140 WerFault.exe 85 4572 4408 WerFault.exe 108 2104 680 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3724 4944 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 83 PID 4944 wrote to memory of 3724 4944 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 83 PID 4944 wrote to memory of 3724 4944 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 83 PID 4944 wrote to memory of 3724 4944 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 83 PID 4944 wrote to memory of 3724 4944 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 83 PID 3724 wrote to memory of 3140 3724 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 85 PID 3724 wrote to memory of 3140 3724 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 85 PID 3724 wrote to memory of 3140 3724 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 85 PID 3140 wrote to memory of 1832 3140 omsecor.exe 87 PID 3140 wrote to memory of 1832 3140 omsecor.exe 87 PID 3140 wrote to memory of 1832 3140 omsecor.exe 87 PID 3140 wrote to memory of 1832 3140 omsecor.exe 87 PID 3140 wrote to memory of 1832 3140 omsecor.exe 87 PID 1832 wrote to memory of 4408 1832 omsecor.exe 108 PID 1832 wrote to memory of 4408 1832 omsecor.exe 108 PID 1832 wrote to memory of 4408 1832 omsecor.exe 108 PID 4408 wrote to memory of 3544 4408 omsecor.exe 109 PID 4408 wrote to memory of 3544 4408 omsecor.exe 109 PID 4408 wrote to memory of 3544 4408 omsecor.exe 109 PID 4408 wrote to memory of 3544 4408 omsecor.exe 109 PID 4408 wrote to memory of 3544 4408 omsecor.exe 109 PID 3544 wrote to memory of 680 3544 omsecor.exe 111 PID 3544 wrote to memory of 680 3544 omsecor.exe 111 PID 3544 wrote to memory of 680 3544 omsecor.exe 111 PID 680 wrote to memory of 3996 680 omsecor.exe 113 PID 680 wrote to memory of 3996 680 omsecor.exe 113 PID 680 wrote to memory of 3996 680 omsecor.exe 113 PID 680 wrote to memory of 3996 680 omsecor.exe 113 PID 680 wrote to memory of 3996 680 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe"C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exeC:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 2608⤵
- Program crash
PID:2104
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 2926⤵
- Program crash
PID:4572
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 3004⤵
- Program crash
PID:1596
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 2882⤵
- Program crash
PID:1148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4944 -ip 49441⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3140 -ip 31401⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4408 -ip 44081⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 680 -ip 6801⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD55dc459b2b0f91ed884042e6a62f0ad84
SHA181d6e611fa225c3a7c9929cf0cc9c6763b07f18a
SHA256818e26dd2a8288fe855d3535254131cc921a01ad26aa4d6fceba2edf8baac86c
SHA512be38fd0003b7d20071e9c4144391ca8da362a504c7c21ee8f75c463b9af20e1643ac761ef1ce3b7abf7a2a22ca5f9ab75ae89a2851684490806b683853b016fc
-
Filesize
134KB
MD5c75758db5fb480a348601802231f639f
SHA12c98b26b84730a89d2e650885562ee4d7c229d22
SHA25645ba5ab14e3c5157da902d73a444260b5d152eb001ca9ff1e2d58539846f4db1
SHA512ded28fb6215dada1c0c024fa109b8bb9a8ee0f62fb47067598abd9949abcf32c968ea6acfa5f5d2a6a6f3f2ce76966671028ab290c39a62f880b67d9706b319b
-
Filesize
134KB
MD545cdb26afa0ca10b45841eaa93753f71
SHA10fb7874b8ee1e4fb791c4a49208758e3958d4191
SHA256538d1ad1f8ebf81fe241a8cdda7cad68bc7e4ddac7805eb28f03a9948dfc803a
SHA512e72aaab1864cd247105a946f2ace392f96ba0e400f2e81546469f14580314f67073505c2442ba2e7f4a2f22b03ff83443698a64b7723a123159b722aa6c707d9