Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe
Resource
win7-20241010-en
General
-
Target
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe
-
Size
96KB
-
MD5
d88b3cd30e3f1447bdfac79a08df111f
-
SHA1
a8288bfa23db0157e34e1dd91d9df0256a5eb69f
-
SHA256
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302
-
SHA512
8655eb41a84c3e8c9fc413fe95f146497e7402c8d2b3342813e537b1b72240597a0191b4e38d1443e79d82770b895dfb870a185e192ab1d9768bd61af55330f5
-
SSDEEP
1536:onAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:oGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4468 omsecor.exe 4960 omsecor.exe 4404 omsecor.exe 2280 omsecor.exe 4992 omsecor.exe 1536 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1644 set thread context of 2696 1644 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 4468 set thread context of 4960 4468 omsecor.exe 87 PID 4404 set thread context of 2280 4404 omsecor.exe 108 PID 4992 set thread context of 1536 4992 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 1068 1644 WerFault.exe 82 2132 4468 WerFault.exe 85 4588 4404 WerFault.exe 107 4968 4992 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2696 1644 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 1644 wrote to memory of 2696 1644 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 1644 wrote to memory of 2696 1644 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 1644 wrote to memory of 2696 1644 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 1644 wrote to memory of 2696 1644 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 83 PID 2696 wrote to memory of 4468 2696 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 85 PID 2696 wrote to memory of 4468 2696 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 85 PID 2696 wrote to memory of 4468 2696 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 85 PID 4468 wrote to memory of 4960 4468 omsecor.exe 87 PID 4468 wrote to memory of 4960 4468 omsecor.exe 87 PID 4468 wrote to memory of 4960 4468 omsecor.exe 87 PID 4468 wrote to memory of 4960 4468 omsecor.exe 87 PID 4468 wrote to memory of 4960 4468 omsecor.exe 87 PID 4960 wrote to memory of 4404 4960 omsecor.exe 107 PID 4960 wrote to memory of 4404 4960 omsecor.exe 107 PID 4960 wrote to memory of 4404 4960 omsecor.exe 107 PID 4404 wrote to memory of 2280 4404 omsecor.exe 108 PID 4404 wrote to memory of 2280 4404 omsecor.exe 108 PID 4404 wrote to memory of 2280 4404 omsecor.exe 108 PID 4404 wrote to memory of 2280 4404 omsecor.exe 108 PID 4404 wrote to memory of 2280 4404 omsecor.exe 108 PID 2280 wrote to memory of 4992 2280 omsecor.exe 110 PID 2280 wrote to memory of 4992 2280 omsecor.exe 110 PID 2280 wrote to memory of 4992 2280 omsecor.exe 110 PID 4992 wrote to memory of 1536 4992 omsecor.exe 112 PID 4992 wrote to memory of 1536 4992 omsecor.exe 112 PID 4992 wrote to memory of 1536 4992 omsecor.exe 112 PID 4992 wrote to memory of 1536 4992 omsecor.exe 112 PID 4992 wrote to memory of 1536 4992 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe"C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exeC:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 2568⤵
- Program crash
PID:4968
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2926⤵
- Program crash
PID:4588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 3044⤵
- Program crash
PID:2132
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 2922⤵
- Program crash
PID:1068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1644 -ip 16441⤵PID:2320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4468 -ip 44681⤵PID:60
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4404 -ip 44041⤵PID:64
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4992 -ip 49921⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD594cb6bf1496dc22100d63514da2e74be
SHA1aba3efc97e4a487bb1f907230c925d8ac12e3f4a
SHA25657308cbbaf4eef76dbc255f42e028e8de5468c3fd9e5aa6bb63fa4a85ee61948
SHA51270c9904498e7138a8ac9327288a2b39d4b472bbc71113993fed1e88aeee42c2e369d94ef540a3e0d93e8f12ddbb1a15a382c536a089b9f4565f799b2def7e5be
-
Filesize
96KB
MD5c229ec62f0c068ef88145ac02af6f35d
SHA1a124c8fe0f0b1b5a765543f24db977c460902680
SHA256c4546cbfa69c716d9a6fbeb4f810760aabb69789bd2356cbc3b3df03744182a9
SHA5123b2a7e3a410b50e05f06da3005a804ec3512aea60073de7e65ed19ff2668d962cb704b5e52a951774e4f51a7ea50b1a6ce7de2fda3ae9c2d3b0f529f05d0ec2a
-
Filesize
96KB
MD5d2a9cb67dc9cf7221b48a9c59c01eacc
SHA16c7e93a61963df1c84ee05851dd555ad56103c3c
SHA256a517b9675eeb80a84104cf50a515fe35b3eaa4480b6078995f58c7292cf447b7
SHA5123ff23322ef35b62ca74a2dd2914056e4bddf51e9c841690872afcdaff2c1040fb0d1a91edc2e1bb571b678a9f1b07445a4aec33227409343e7efb439bc0af9ad