Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe
Resource
win7-20241010-en
General
-
Target
e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe
-
Size
96KB
-
MD5
e7b21e143f78b089835bb83b0d883cd3
-
SHA1
b7dcac827c045891b15108cc070b14e40d4defa0
-
SHA256
e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b
-
SHA512
e3df15543382a0bfad4907ab39921afcad4eb31d82195fcdc2b97bad1c18ac3e4b970cd65f1dd32a62126e3869293bb4d8cf915f6cc6c8cd2cc4925d41c77b74
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:MGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1380 omsecor.exe 3596 omsecor.exe 3676 omsecor.exe 2128 omsecor.exe 2840 omsecor.exe 540 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1564 set thread context of 1172 1564 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 83 PID 1380 set thread context of 3596 1380 omsecor.exe 88 PID 3676 set thread context of 2128 3676 omsecor.exe 107 PID 2840 set thread context of 540 2840 omsecor.exe 111 -
Program crash 4 IoCs
pid pid_target Process procid_target 3652 1564 WerFault.exe 82 1692 1380 WerFault.exe 85 4904 3676 WerFault.exe 106 4304 2840 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1564 wrote to memory of 1172 1564 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 83 PID 1564 wrote to memory of 1172 1564 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 83 PID 1564 wrote to memory of 1172 1564 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 83 PID 1564 wrote to memory of 1172 1564 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 83 PID 1564 wrote to memory of 1172 1564 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 83 PID 1172 wrote to memory of 1380 1172 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 85 PID 1172 wrote to memory of 1380 1172 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 85 PID 1172 wrote to memory of 1380 1172 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 85 PID 1380 wrote to memory of 3596 1380 omsecor.exe 88 PID 1380 wrote to memory of 3596 1380 omsecor.exe 88 PID 1380 wrote to memory of 3596 1380 omsecor.exe 88 PID 1380 wrote to memory of 3596 1380 omsecor.exe 88 PID 1380 wrote to memory of 3596 1380 omsecor.exe 88 PID 3596 wrote to memory of 3676 3596 omsecor.exe 106 PID 3596 wrote to memory of 3676 3596 omsecor.exe 106 PID 3596 wrote to memory of 3676 3596 omsecor.exe 106 PID 3676 wrote to memory of 2128 3676 omsecor.exe 107 PID 3676 wrote to memory of 2128 3676 omsecor.exe 107 PID 3676 wrote to memory of 2128 3676 omsecor.exe 107 PID 3676 wrote to memory of 2128 3676 omsecor.exe 107 PID 3676 wrote to memory of 2128 3676 omsecor.exe 107 PID 2128 wrote to memory of 2840 2128 omsecor.exe 109 PID 2128 wrote to memory of 2840 2128 omsecor.exe 109 PID 2128 wrote to memory of 2840 2128 omsecor.exe 109 PID 2840 wrote to memory of 540 2840 omsecor.exe 111 PID 2840 wrote to memory of 540 2840 omsecor.exe 111 PID 2840 wrote to memory of 540 2840 omsecor.exe 111 PID 2840 wrote to memory of 540 2840 omsecor.exe 111 PID 2840 wrote to memory of 540 2840 omsecor.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe"C:\Users\Admin\AppData\Local\Temp\e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exeC:\Users\Admin\AppData\Local\Temp\e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 2448⤵
- Program crash
PID:4304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 2926⤵
- Program crash
PID:4904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 2884⤵
- Program crash
PID:1692
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 3002⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1564 -ip 15641⤵PID:2552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1380 -ip 13801⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3676 -ip 36761⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2840 -ip 28401⤵PID:4692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD588a2a7a837f5dba6645c2b32c9ec5b62
SHA18b586fe8192128c6b5dbd19909a8d826e64169f7
SHA256e555359ec79944e174eb60d6b1a5d47b32ac6bf17f360968e4ee830ac7cc2768
SHA51275903120da37982058da3b09464c1996be6a1dd04c6da76d28674f07f636a6e741ac772c5b199c8330a0c6af76f983b23ed255ae9334265711be2ec25ab1fd7f
-
Filesize
96KB
MD5585c4c9ea357839b6a04a1f249825846
SHA155710355c7a2262982cfb6ea516d97f848f75579
SHA256324a22efaf6c5d5a293c5a0bc0637fa33d24ce9977e5a9745d4814b645c4750b
SHA5128d73a9befb3021da72acac21087fa8bccc11caccc60e974732c0dc994ad4106262ae7bc90e89632bb8f43df3d643296999da0d4641199eb891b36b15082aca36
-
Filesize
96KB
MD505af7b5446f2a5bd79dd5882b6668c2d
SHA166fac4f78938fe8d58eb3eb573133eeec15aacee
SHA2560dfd5d90852c997c71d65806cf15881b3f6fb257855543f16d788db7564b08c3
SHA512b301a5d88670965eac4eb704f3a6f8e273dd157513efd9695a6629305872e196821dc390e9faddede1aee0a7a65ec11ed923d53d10a08dfdb2eac4dd8bd27687