Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe
Resource
win7-20240708-en
General
-
Target
fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe
-
Size
96KB
-
MD5
b3ed9190eeb41cfeebf7fe819ebb0500
-
SHA1
0720d3e3de08c0574e391dea8b49bd6ce3b1065b
-
SHA256
fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755
-
SHA512
b6a8d35dc333b4ebb3ab427fbc99612da1a87dbbc23333e564c779ad8824b9420aa415bf8b7c668c0c1710bd9aa17832361bf029d81da3c4d80485a3006ba8c0
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:MGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3868 omsecor.exe 1916 omsecor.exe 4152 omsecor.exe 3720 omsecor.exe 4228 omsecor.exe 4488 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3208 set thread context of 2400 3208 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 82 PID 3868 set thread context of 1916 3868 omsecor.exe 87 PID 4152 set thread context of 3720 4152 omsecor.exe 100 PID 4228 set thread context of 4488 4228 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 1752 3208 WerFault.exe 81 4052 3868 WerFault.exe 85 1476 4152 WerFault.exe 99 1092 4228 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3208 wrote to memory of 2400 3208 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 82 PID 3208 wrote to memory of 2400 3208 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 82 PID 3208 wrote to memory of 2400 3208 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 82 PID 3208 wrote to memory of 2400 3208 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 82 PID 3208 wrote to memory of 2400 3208 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 82 PID 2400 wrote to memory of 3868 2400 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 85 PID 2400 wrote to memory of 3868 2400 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 85 PID 2400 wrote to memory of 3868 2400 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 85 PID 3868 wrote to memory of 1916 3868 omsecor.exe 87 PID 3868 wrote to memory of 1916 3868 omsecor.exe 87 PID 3868 wrote to memory of 1916 3868 omsecor.exe 87 PID 3868 wrote to memory of 1916 3868 omsecor.exe 87 PID 3868 wrote to memory of 1916 3868 omsecor.exe 87 PID 1916 wrote to memory of 4152 1916 omsecor.exe 99 PID 1916 wrote to memory of 4152 1916 omsecor.exe 99 PID 1916 wrote to memory of 4152 1916 omsecor.exe 99 PID 4152 wrote to memory of 3720 4152 omsecor.exe 100 PID 4152 wrote to memory of 3720 4152 omsecor.exe 100 PID 4152 wrote to memory of 3720 4152 omsecor.exe 100 PID 4152 wrote to memory of 3720 4152 omsecor.exe 100 PID 4152 wrote to memory of 3720 4152 omsecor.exe 100 PID 3720 wrote to memory of 4228 3720 omsecor.exe 102 PID 3720 wrote to memory of 4228 3720 omsecor.exe 102 PID 3720 wrote to memory of 4228 3720 omsecor.exe 102 PID 4228 wrote to memory of 4488 4228 omsecor.exe 103 PID 4228 wrote to memory of 4488 4228 omsecor.exe 103 PID 4228 wrote to memory of 4488 4228 omsecor.exe 103 PID 4228 wrote to memory of 4488 4228 omsecor.exe 103 PID 4228 wrote to memory of 4488 4228 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe"C:\Users\Admin\AppData\Local\Temp\fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exeC:\Users\Admin\AppData\Local\Temp\fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 2688⤵
- Program crash
PID:1092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 2926⤵
- Program crash
PID:1476
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 2884⤵
- Program crash
PID:4052
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 2522⤵
- Program crash
PID:1752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3208 -ip 32081⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3868 -ip 38681⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4152 -ip 41521⤵PID:400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4228 -ip 42281⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD51f97c26de7bb3036ef4e3b0338b8fc0d
SHA1332b4839e06d85ee6a2c8b4d2e6b5fa6b278dfc7
SHA2568224e98d7e836d01d4f1e34480641b4c3676b8fe5b76b0ad70f5326a89a3c76b
SHA51211e313b64f22b3d9f175f10aea537b00465e5d8e161c47693a464fd1882294da9f64740708012d8a086b26b4b316372e94f9f5817661d792e52108e493fcaa32
-
Filesize
96KB
MD59cfa878691bde324abe95cc30568f05c
SHA16e7904ded78d25ffe0b4356b43e0890bf56a1885
SHA25605daa229b08a67c579709c326d95637ce1dd23112a7137552042673cd2b2d443
SHA5120bf9fccc46d02eda8583534842a0c50aa7d4c007ad2bd14483181468525578e666e6021d02de0a64a02998213760e5febfec08678ae0650667f7e74a81c34913
-
Filesize
96KB
MD541bfbae609c09de5e68d2556ac9d31df
SHA12923f4d9b52ad89f5ab02e4498b465d87fae72c8
SHA25680eb7785808c3a538b59b64c99180d6a436f291871b0d04538aa10c8cb5d88b8
SHA5121ad10756876e4296b86d27d06d1241a99073097548d8bee0f49ca9b92525e535eea655efd89b654b3688ec40166aa934488e6193cd5fc87d332e0ddc4e27afd0