Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-12-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe
Resource
win7-20241010-en
General
-
Target
fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe
-
Size
134KB
-
MD5
32eb432058e7df3ac503e9052922d21f
-
SHA1
0c5b18d9fbb106ed63d776607733b22c72710712
-
SHA256
fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff
-
SHA512
5dcf17e7cb61a391d66cc046746382e87f856bfb05de1c119fb13fd8e497c5f06f6e13973d6f9b24a81a289f29fafd93d22f831d2013d585b22eec2264cb3460
-
SSDEEP
1536:2DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:oiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 5012 omsecor.exe 232 omsecor.exe 1600 omsecor.exe 3540 omsecor.exe 3716 omsecor.exe 5036 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4876 set thread context of 4808 4876 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 83 PID 5012 set thread context of 232 5012 omsecor.exe 88 PID 1600 set thread context of 3540 1600 omsecor.exe 108 PID 3716 set thread context of 5036 3716 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 2708 4876 WerFault.exe 82 1616 5012 WerFault.exe 86 2196 1600 WerFault.exe 107 5092 3716 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4808 4876 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 83 PID 4876 wrote to memory of 4808 4876 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 83 PID 4876 wrote to memory of 4808 4876 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 83 PID 4876 wrote to memory of 4808 4876 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 83 PID 4876 wrote to memory of 4808 4876 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 83 PID 4808 wrote to memory of 5012 4808 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 86 PID 4808 wrote to memory of 5012 4808 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 86 PID 4808 wrote to memory of 5012 4808 fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe 86 PID 5012 wrote to memory of 232 5012 omsecor.exe 88 PID 5012 wrote to memory of 232 5012 omsecor.exe 88 PID 5012 wrote to memory of 232 5012 omsecor.exe 88 PID 5012 wrote to memory of 232 5012 omsecor.exe 88 PID 5012 wrote to memory of 232 5012 omsecor.exe 88 PID 232 wrote to memory of 1600 232 omsecor.exe 107 PID 232 wrote to memory of 1600 232 omsecor.exe 107 PID 232 wrote to memory of 1600 232 omsecor.exe 107 PID 1600 wrote to memory of 3540 1600 omsecor.exe 108 PID 1600 wrote to memory of 3540 1600 omsecor.exe 108 PID 1600 wrote to memory of 3540 1600 omsecor.exe 108 PID 1600 wrote to memory of 3540 1600 omsecor.exe 108 PID 1600 wrote to memory of 3540 1600 omsecor.exe 108 PID 3540 wrote to memory of 3716 3540 omsecor.exe 110 PID 3540 wrote to memory of 3716 3540 omsecor.exe 110 PID 3540 wrote to memory of 3716 3540 omsecor.exe 110 PID 3716 wrote to memory of 5036 3716 omsecor.exe 111 PID 3716 wrote to memory of 5036 3716 omsecor.exe 111 PID 3716 wrote to memory of 5036 3716 omsecor.exe 111 PID 3716 wrote to memory of 5036 3716 omsecor.exe 111 PID 3716 wrote to memory of 5036 3716 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe"C:\Users\Admin\AppData\Local\Temp\fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exeC:\Users\Admin\AppData\Local\Temp\fef6b6ece0e7b67fbc701dec5fec7989196a5146a8d139d1afd584ea5c5583ff.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 2688⤵
- Program crash
PID:5092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 2926⤵
- Program crash
PID:2196
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 2884⤵
- Program crash
PID:1616
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 3002⤵
- Program crash
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4876 -ip 48761⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5012 -ip 50121⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1600 -ip 16001⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3716 -ip 37161⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5bb5e87c94393875899725cc9cb42741a
SHA1d66350fb47eb3d31e550ffcaaf8d8b9a2bc0ba7d
SHA2560b831757dd28a78c6d84f21dd055733ae8ddba835ea7b043e56bcbb0a7a2ede7
SHA51273f7c505288387e4dfcbefc17211d081028e4e17d5d03d4a34682edcb7d75f2626d05ba7a1ef11f20576fe8e37bf40e41191d6e0f0a22591e897cb15287f32c4
-
Filesize
134KB
MD5e17e6f6e8f6594f8c820f7094df3d4a5
SHA11883b26cf91bd9eaca5b08b3cd6903bd6aac1940
SHA256d391c3a47f66fb3a5fa383411f992ff2ce12ac2782e00130ae5121c883a17311
SHA51212f41937156f7bb82d4f673b8043f6062a8bbf91b9ffe6dfc3c2aad315313d357fbc39e2c3f0c4b0ace8557f7fafc21436eb13568b0aa37de0a83640344f3037
-
Filesize
134KB
MD53223f10d620d1e1a61d8cc269ea53400
SHA1cfde6fb2cc5c2e9d1bc9f0f610e7ad4e95f20a5c
SHA25654d41349cb86c3e6dc65b85e2430f9603e4c79abc855d679a232c5e7416f77b7
SHA512b9a3b29ae8dfb489fb7a4e35bb12e2d2eedd46c98f2cdcea11c75f3b2bcfbfc69f7bec4a045dc83111fe816fb25b0dbae06c2a472176f77ce9e722c8d2c82eb4