Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe
Resource
win7-20240903-en
General
-
Target
b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe
-
Size
96KB
-
MD5
f13492ee049c526f1bec0f01336068ad
-
SHA1
d07e251fb43f1a109b4b0b7c7c4fb293c6fdb674
-
SHA256
b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944
-
SHA512
4af168910ceba3f00fa73bf83660f4b4bfbe0e8e78c3c6d34b4309469aba0f086e51e885544cd7879b68cfe9e723a83da879f9c31d0afb81b34770a1ca559b63
-
SSDEEP
1536:BnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:BGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1072 omsecor.exe 3344 omsecor.exe 2744 omsecor.exe 2160 omsecor.exe 1224 omsecor.exe 3604 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1512 set thread context of 4828 1512 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 82 PID 1072 set thread context of 3344 1072 omsecor.exe 86 PID 2744 set thread context of 2160 2744 omsecor.exe 100 PID 1224 set thread context of 3604 1224 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 2916 1512 WerFault.exe 81 372 1072 WerFault.exe 84 4480 2744 WerFault.exe 99 1640 1224 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1512 wrote to memory of 4828 1512 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 82 PID 1512 wrote to memory of 4828 1512 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 82 PID 1512 wrote to memory of 4828 1512 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 82 PID 1512 wrote to memory of 4828 1512 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 82 PID 1512 wrote to memory of 4828 1512 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 82 PID 4828 wrote to memory of 1072 4828 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 84 PID 4828 wrote to memory of 1072 4828 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 84 PID 4828 wrote to memory of 1072 4828 b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe 84 PID 1072 wrote to memory of 3344 1072 omsecor.exe 86 PID 1072 wrote to memory of 3344 1072 omsecor.exe 86 PID 1072 wrote to memory of 3344 1072 omsecor.exe 86 PID 1072 wrote to memory of 3344 1072 omsecor.exe 86 PID 1072 wrote to memory of 3344 1072 omsecor.exe 86 PID 3344 wrote to memory of 2744 3344 omsecor.exe 99 PID 3344 wrote to memory of 2744 3344 omsecor.exe 99 PID 3344 wrote to memory of 2744 3344 omsecor.exe 99 PID 2744 wrote to memory of 2160 2744 omsecor.exe 100 PID 2744 wrote to memory of 2160 2744 omsecor.exe 100 PID 2744 wrote to memory of 2160 2744 omsecor.exe 100 PID 2744 wrote to memory of 2160 2744 omsecor.exe 100 PID 2744 wrote to memory of 2160 2744 omsecor.exe 100 PID 2160 wrote to memory of 1224 2160 omsecor.exe 102 PID 2160 wrote to memory of 1224 2160 omsecor.exe 102 PID 2160 wrote to memory of 1224 2160 omsecor.exe 102 PID 1224 wrote to memory of 3604 1224 omsecor.exe 103 PID 1224 wrote to memory of 3604 1224 omsecor.exe 103 PID 1224 wrote to memory of 3604 1224 omsecor.exe 103 PID 1224 wrote to memory of 3604 1224 omsecor.exe 103 PID 1224 wrote to memory of 3604 1224 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe"C:\Users\Admin\AppData\Local\Temp\b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exeC:\Users\Admin\AppData\Local\Temp\b5f26e581a6820ac1a64a1491ff41cc5380ff5092a8ccef3ffe4a78f3512e944.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 2568⤵
- Program crash
PID:1640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 2926⤵
- Program crash
PID:4480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 3004⤵
- Program crash
PID:372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 2882⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1512 -ip 15121⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1072 -ip 10721⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2744 -ip 27441⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1224 -ip 12241⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD543a122d03bd1c4f1a1b0a4c7834796d6
SHA152a8d401d43f5f8acfa7c12666dbe6d28dbb46f5
SHA25622a347753d08158c5016e90b48f4e1afc85ff9e033f74fa0cc750b544600bd38
SHA512dcd2e886ce98cad313f3bb6e7cb8e146a07b7df4bbc9c08d36723fa62590dbaa5957808d07f4195257eb3de0d245dd6691bdc8a0d6a5f652a985e3fdba457ef7
-
Filesize
96KB
MD51912b262feb9e637c298f0a93305c918
SHA139494753a25184601df5816ee34011b9ef09d4b0
SHA256c156c4a95f74c8d20b461cc15134d8bca64e423e1bf3912069add0c81638b795
SHA51238f2851337c9204b04a2eba591a4b2b39cea122978288552b72c60eb21291315d13ee9fb3ebcebec337c96a4904bc25326568386e07e38ebb4bb5b7e5ef75a7c
-
Filesize
96KB
MD52128b07c4981a75e2295bdd31e80f449
SHA15f18fe763f813b4a4f2b243b7e24d860721d0945
SHA256437c548663af57129df74fa5aacc7dd8fe9193eb206bbb591a7539020e383690
SHA51240b7b7b2ca24891866b11244a137be4a2a2b08034524037b54cc2326c1b7e56ac026c8531549afe629d0e6fef5b9a45573f927209d9d3508f4aaa8481825305e