Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe
Resource
win7-20240903-en
General
-
Target
80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe
-
Size
96KB
-
MD5
59ede50b044e7f3ffd426ea37c7ec221
-
SHA1
bb29aa3c358decf7da5040882309011f20f3eeec
-
SHA256
80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a
-
SHA512
4d41db7101616917dd0d228e649bb2615ef5b13561c5b909faac2304878116f680dc7b4ff724b321c876025c13961846c52f3d750448d87b508ef46916126b9b
-
SSDEEP
1536:2nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:2Gs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3060 omsecor.exe 2188 omsecor.exe 4116 omsecor.exe 456 omsecor.exe 4700 omsecor.exe 3328 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3192 set thread context of 1848 3192 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 82 PID 3060 set thread context of 2188 3060 omsecor.exe 87 PID 4116 set thread context of 456 4116 omsecor.exe 100 PID 4700 set thread context of 3328 4700 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2340 3192 WerFault.exe 81 912 3060 WerFault.exe 84 1272 4116 WerFault.exe 99 948 4700 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3192 wrote to memory of 1848 3192 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 82 PID 3192 wrote to memory of 1848 3192 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 82 PID 3192 wrote to memory of 1848 3192 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 82 PID 3192 wrote to memory of 1848 3192 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 82 PID 3192 wrote to memory of 1848 3192 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 82 PID 1848 wrote to memory of 3060 1848 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 84 PID 1848 wrote to memory of 3060 1848 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 84 PID 1848 wrote to memory of 3060 1848 80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe 84 PID 3060 wrote to memory of 2188 3060 omsecor.exe 87 PID 3060 wrote to memory of 2188 3060 omsecor.exe 87 PID 3060 wrote to memory of 2188 3060 omsecor.exe 87 PID 3060 wrote to memory of 2188 3060 omsecor.exe 87 PID 3060 wrote to memory of 2188 3060 omsecor.exe 87 PID 2188 wrote to memory of 4116 2188 omsecor.exe 99 PID 2188 wrote to memory of 4116 2188 omsecor.exe 99 PID 2188 wrote to memory of 4116 2188 omsecor.exe 99 PID 4116 wrote to memory of 456 4116 omsecor.exe 100 PID 4116 wrote to memory of 456 4116 omsecor.exe 100 PID 4116 wrote to memory of 456 4116 omsecor.exe 100 PID 4116 wrote to memory of 456 4116 omsecor.exe 100 PID 4116 wrote to memory of 456 4116 omsecor.exe 100 PID 456 wrote to memory of 4700 456 omsecor.exe 102 PID 456 wrote to memory of 4700 456 omsecor.exe 102 PID 456 wrote to memory of 4700 456 omsecor.exe 102 PID 4700 wrote to memory of 3328 4700 omsecor.exe 104 PID 4700 wrote to memory of 3328 4700 omsecor.exe 104 PID 4700 wrote to memory of 3328 4700 omsecor.exe 104 PID 4700 wrote to memory of 3328 4700 omsecor.exe 104 PID 4700 wrote to memory of 3328 4700 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe"C:\Users\Admin\AppData\Local\Temp\80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exeC:\Users\Admin\AppData\Local\Temp\80751f1e20437b84e93053d24566a52076b9d61465e3b59d3e6627ae1756f12a.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 2568⤵
- Program crash
PID:948
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 2926⤵
- Program crash
PID:1272
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 3044⤵
- Program crash
PID:912
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 3002⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3192 -ip 31921⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3060 -ip 30601⤵PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4116 -ip 41161⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4700 -ip 47001⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5deb8b65ebf2ce60113921e3c3e2205cd
SHA170153266e1864d6704004b6f0e0470fcd65a1248
SHA2563e3a55b7c2cf1cd31075550996f73579351f19cb739e41f11f63dacfee6235e1
SHA51298b25833d8316ae847221b14a066f03d83eef090c9e2f34c55802da22bb89783b0a23024c39b52afb1503756bd9baf1ed3925d5159a56f89077a3edcf6f193ab
-
Filesize
96KB
MD5bc20ab786412d9f60051c811dbb7e8bb
SHA101d9bf2f71c0ddbc4f36dd520dc5a68c9364a021
SHA2563a220fbbcba1335881ab989434508ce68cf7c4cf2e09f0b4a8da40bf17336564
SHA512b3821d9abf677b4d19bd7edcd76e96052b43ef919d738eb54769ccffd80839da74873fd149888ace9fdc21ec0c293225a77b8a7056a48f0c936007be83d79f61
-
Filesize
96KB
MD55db05aa134c57ad8fde36b70b26643ea
SHA19ae53446347a65b26408a23dec696eeaebe90c18
SHA25664203df96489fc0e7518414244f821830b2db5668647a1e090acefc252296b83
SHA5122be7a07a5d258c5b7d09fe9f04fba4d81861fc03f7d355f8a6f474067e76e764c643f1a0677bb15b1435fb880367febb9182c4d17c838fba735c10a53c2cff31