Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe
Resource
win7-20240903-en
General
-
Target
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe
-
Size
96KB
-
MD5
d88b3cd30e3f1447bdfac79a08df111f
-
SHA1
a8288bfa23db0157e34e1dd91d9df0256a5eb69f
-
SHA256
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302
-
SHA512
8655eb41a84c3e8c9fc413fe95f146497e7402c8d2b3342813e537b1b72240597a0191b4e38d1443e79d82770b895dfb870a185e192ab1d9768bd61af55330f5
-
SSDEEP
1536:onAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:oGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1668 omsecor.exe 4008 omsecor.exe 4172 omsecor.exe 3968 omsecor.exe 4340 omsecor.exe 1168 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4048 set thread context of 1136 4048 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 1668 set thread context of 4008 1668 omsecor.exe 87 PID 4172 set thread context of 3968 4172 omsecor.exe 109 PID 4340 set thread context of 1168 4340 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 1360 4048 WerFault.exe 82 2128 1668 WerFault.exe 85 1452 4172 WerFault.exe 108 1668 4340 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1136 4048 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 4048 wrote to memory of 1136 4048 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 4048 wrote to memory of 1136 4048 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 4048 wrote to memory of 1136 4048 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 4048 wrote to memory of 1136 4048 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 1136 wrote to memory of 1668 1136 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 85 PID 1136 wrote to memory of 1668 1136 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 85 PID 1136 wrote to memory of 1668 1136 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 85 PID 1668 wrote to memory of 4008 1668 omsecor.exe 87 PID 1668 wrote to memory of 4008 1668 omsecor.exe 87 PID 1668 wrote to memory of 4008 1668 omsecor.exe 87 PID 1668 wrote to memory of 4008 1668 omsecor.exe 87 PID 1668 wrote to memory of 4008 1668 omsecor.exe 87 PID 4008 wrote to memory of 4172 4008 omsecor.exe 108 PID 4008 wrote to memory of 4172 4008 omsecor.exe 108 PID 4008 wrote to memory of 4172 4008 omsecor.exe 108 PID 4172 wrote to memory of 3968 4172 omsecor.exe 109 PID 4172 wrote to memory of 3968 4172 omsecor.exe 109 PID 4172 wrote to memory of 3968 4172 omsecor.exe 109 PID 4172 wrote to memory of 3968 4172 omsecor.exe 109 PID 4172 wrote to memory of 3968 4172 omsecor.exe 109 PID 3968 wrote to memory of 4340 3968 omsecor.exe 111 PID 3968 wrote to memory of 4340 3968 omsecor.exe 111 PID 3968 wrote to memory of 4340 3968 omsecor.exe 111 PID 4340 wrote to memory of 1168 4340 omsecor.exe 113 PID 4340 wrote to memory of 1168 4340 omsecor.exe 113 PID 4340 wrote to memory of 1168 4340 omsecor.exe 113 PID 4340 wrote to memory of 1168 4340 omsecor.exe 113 PID 4340 wrote to memory of 1168 4340 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe"C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exeC:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 2688⤵
- Program crash
PID:1668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 2966⤵
- Program crash
PID:1452
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 3004⤵
- Program crash
PID:2128
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4048 -s 2882⤵
- Program crash
PID:1360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4048 -ip 40481⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1668 -ip 16681⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4172 -ip 41721⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4340 -ip 43401⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f556ea2c3a0570bfaabc0df6b7d9ee84
SHA1ce85dadde673f1074cf575e156d583d8fdf9b8e2
SHA2561f570d54cbbd7d4d559b0697a69f2dc8f0ba52685150e82e0f4d8e76dcb5c910
SHA512f1f3276ab902e6fccb598d2254c6053e2115895618ba7580840c110a9dd8e0d776aea47b735fe9b18e1802977e1ac5b97a94d78cef571f98a6d879c139cbf833
-
Filesize
96KB
MD5c229ec62f0c068ef88145ac02af6f35d
SHA1a124c8fe0f0b1b5a765543f24db977c460902680
SHA256c4546cbfa69c716d9a6fbeb4f810760aabb69789bd2356cbc3b3df03744182a9
SHA5123b2a7e3a410b50e05f06da3005a804ec3512aea60073de7e65ed19ff2668d962cb704b5e52a951774e4f51a7ea50b1a6ce7de2fda3ae9c2d3b0f529f05d0ec2a
-
Filesize
96KB
MD55541d74dc22b47b25cadf2b190f01b24
SHA1073980e5b7abcc997c9a5606219e572ee2ef6ab8
SHA256acebfeb7a95a57ee04166349ffd1aedcac0db314aadcf2d40eeaaa730ba1c8a4
SHA512f8227960e1f98e921b0ca77500eb5382ee926dde885017c0621445e75bbb1d86f2329f5a8fb47ce6a7a8f53f7e4ab7d332c32304efc678546410c5b51a1957e8