Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 10:46
Static task
static1
Behavioral task
behavioral1
Sample
44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe
Resource
win7-20240903-en
General
-
Target
44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe
-
Size
134KB
-
MD5
bd6ce6b625fe5fbbad2e65eb4db34a40
-
SHA1
0215172cc69119d8f0f088b58f64c5a281f44fef
-
SHA256
44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699
-
SHA512
7e2654c3b984a9298284e60bfb0f6adabe78c5d2516c06ce0c6e02cd402a91254a92259c3bb8c03e4af419b9a83173ae216b5f920194498e9dba3128ee4c0f92
-
SSDEEP
1536:bDfDbhERTatPLTH0NqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwC7l:XiRTeH0NqAW6J6f1tqF6dngNmaZC7Mc
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2360 omsecor.exe 3356 omsecor.exe 4300 omsecor.exe 1632 omsecor.exe 3824 omsecor.exe 1456 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3148 set thread context of 1592 3148 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 83 PID 2360 set thread context of 3356 2360 omsecor.exe 88 PID 4300 set thread context of 1632 4300 omsecor.exe 108 PID 3824 set thread context of 1456 3824 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 2228 3148 WerFault.exe 82 4684 2360 WerFault.exe 85 3148 4300 WerFault.exe 107 5020 3824 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3148 wrote to memory of 1592 3148 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 83 PID 3148 wrote to memory of 1592 3148 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 83 PID 3148 wrote to memory of 1592 3148 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 83 PID 3148 wrote to memory of 1592 3148 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 83 PID 3148 wrote to memory of 1592 3148 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 83 PID 1592 wrote to memory of 2360 1592 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 85 PID 1592 wrote to memory of 2360 1592 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 85 PID 1592 wrote to memory of 2360 1592 44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe 85 PID 2360 wrote to memory of 3356 2360 omsecor.exe 88 PID 2360 wrote to memory of 3356 2360 omsecor.exe 88 PID 2360 wrote to memory of 3356 2360 omsecor.exe 88 PID 2360 wrote to memory of 3356 2360 omsecor.exe 88 PID 2360 wrote to memory of 3356 2360 omsecor.exe 88 PID 3356 wrote to memory of 4300 3356 omsecor.exe 107 PID 3356 wrote to memory of 4300 3356 omsecor.exe 107 PID 3356 wrote to memory of 4300 3356 omsecor.exe 107 PID 4300 wrote to memory of 1632 4300 omsecor.exe 108 PID 4300 wrote to memory of 1632 4300 omsecor.exe 108 PID 4300 wrote to memory of 1632 4300 omsecor.exe 108 PID 4300 wrote to memory of 1632 4300 omsecor.exe 108 PID 4300 wrote to memory of 1632 4300 omsecor.exe 108 PID 1632 wrote to memory of 3824 1632 omsecor.exe 110 PID 1632 wrote to memory of 3824 1632 omsecor.exe 110 PID 1632 wrote to memory of 3824 1632 omsecor.exe 110 PID 3824 wrote to memory of 1456 3824 omsecor.exe 111 PID 3824 wrote to memory of 1456 3824 omsecor.exe 111 PID 3824 wrote to memory of 1456 3824 omsecor.exe 111 PID 3824 wrote to memory of 1456 3824 omsecor.exe 111 PID 3824 wrote to memory of 1456 3824 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe"C:\Users\Admin\AppData\Local\Temp\44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exeC:\Users\Admin\AppData\Local\Temp\44597dbe262e10361698e2f16e5e43b8beabd0d730e83a7c211833fc2fcb8699N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3824 -s 2688⤵
- Program crash
PID:5020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 2926⤵
- Program crash
PID:3148
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 2884⤵
- Program crash
PID:4684
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 2882⤵
- Program crash
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3148 -ip 31481⤵PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2360 -ip 23601⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4300 -ip 43001⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3824 -ip 38241⤵PID:2636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56ea3198c74cecde530ed21f60e3aa476
SHA1f2e8356e48e8a931a4c693326323a4816c1d7ecb
SHA2561a8bc19aaa2c2ff39d565f4318f8164acb4f3b157aa98f7a881b4dd1e967d8cb
SHA512291392d8de4c2f9a3151449fa15af35eb658db229e85390d5d769f6cbcd877dc90a45036194c71fed1e46ba9cf528d8db6babb560fbb2609bb5cf2120d65738f
-
Filesize
134KB
MD57931b9e3414b127b62be847428e4c9af
SHA1d456b7a23a04cce29315595ecfe7cfa1edff32d2
SHA256415aea8d85f2b500ac86e26a17fa8d25f32f89b60bd65655367b44813499cff8
SHA5121c58f93585500eda07f2b6ff93d5599ac9093c70b9a857a41553a49afc13af099f55e38e4f9a299fd7901cf1478dc23e33c300a9bc62059c48787d559ee15508
-
Filesize
134KB
MD5e99556e9775656680ce82c67f64bc982
SHA176508935b8a7910f6f89da61d0a1cd88ef62b029
SHA256d1fc39f169e214a79349b632c76a5cdce446e6bea7addea29c5e4bf03a9d09e9
SHA5125892de0acb8a52ef1c7364646cef5a8df082b56f386753231a377401a6994fc5b351e128df2686accc255c4e2972ef6b5502ec296b0d8638d4512c049fa4425b