Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe
Resource
win7-20240903-en
General
-
Target
1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe
-
Size
134KB
-
MD5
9e1819eedab3513d2b838dfec76000a0
-
SHA1
aa5d7cb394186c042f3e06eae176f5bf0af8a933
-
SHA256
1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99
-
SHA512
3c556e7651560e3651c8bff3aa156c226abe95a2dc13370e3fc300b9c3f7423d00e359f276ca5616901b6ad54af8f6d37ecdbee0970162002a42860b855ae057
-
SSDEEP
1536:KDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi9:siRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 184 omsecor.exe 4728 omsecor.exe 2804 omsecor.exe 4996 omsecor.exe 940 omsecor.exe 868 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 952 set thread context of 3892 952 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 82 PID 184 set thread context of 4728 184 omsecor.exe 86 PID 2804 set thread context of 4996 2804 omsecor.exe 100 PID 940 set thread context of 868 940 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4128 184 WerFault.exe 85 4268 952 WerFault.exe 81 4536 2804 WerFault.exe 99 1828 940 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 952 wrote to memory of 3892 952 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 82 PID 952 wrote to memory of 3892 952 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 82 PID 952 wrote to memory of 3892 952 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 82 PID 952 wrote to memory of 3892 952 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 82 PID 952 wrote to memory of 3892 952 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 82 PID 3892 wrote to memory of 184 3892 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 85 PID 3892 wrote to memory of 184 3892 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 85 PID 3892 wrote to memory of 184 3892 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 85 PID 184 wrote to memory of 4728 184 omsecor.exe 86 PID 184 wrote to memory of 4728 184 omsecor.exe 86 PID 184 wrote to memory of 4728 184 omsecor.exe 86 PID 184 wrote to memory of 4728 184 omsecor.exe 86 PID 184 wrote to memory of 4728 184 omsecor.exe 86 PID 4728 wrote to memory of 2804 4728 omsecor.exe 99 PID 4728 wrote to memory of 2804 4728 omsecor.exe 99 PID 4728 wrote to memory of 2804 4728 omsecor.exe 99 PID 2804 wrote to memory of 4996 2804 omsecor.exe 100 PID 2804 wrote to memory of 4996 2804 omsecor.exe 100 PID 2804 wrote to memory of 4996 2804 omsecor.exe 100 PID 2804 wrote to memory of 4996 2804 omsecor.exe 100 PID 2804 wrote to memory of 4996 2804 omsecor.exe 100 PID 4996 wrote to memory of 940 4996 omsecor.exe 102 PID 4996 wrote to memory of 940 4996 omsecor.exe 102 PID 4996 wrote to memory of 940 4996 omsecor.exe 102 PID 940 wrote to memory of 868 940 omsecor.exe 104 PID 940 wrote to memory of 868 940 omsecor.exe 104 PID 940 wrote to memory of 868 940 omsecor.exe 104 PID 940 wrote to memory of 868 940 omsecor.exe 104 PID 940 wrote to memory of 868 940 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe"C:\Users\Admin\AppData\Local\Temp\1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exeC:\Users\Admin\AppData\Local\Temp\1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 2568⤵
- Program crash
PID:1828
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 2926⤵
- Program crash
PID:4536
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 184 -s 3004⤵
- Program crash
PID:4128
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 952 -s 2882⤵
- Program crash
PID:4268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 952 -ip 9521⤵PID:320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 184 -ip 1841⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2804 -ip 28041⤵PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 940 -ip 9401⤵PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5a20a11e17973bcf9f9ff3a841eb9e80d
SHA19c7bddb753d5b5bd000bb31d60e972d795664ff7
SHA256b447bd6f12253dcbd529299aece48b11972212ed15f1262489431b4d35957f60
SHA5129525ee123b79d87da37a6c70852dd1955228c1cca76ec38570586c76b366a98143f44d6792b4053cc12374a49279ec9fb74fcb671dc7845fd002f9b3daddd67e
-
Filesize
134KB
MD593c4133181cb2595cd3f40f2f1f582bf
SHA106dbf67a857e6c09ccff202f2e7cca6a8c62fae8
SHA256f424538f7783fd9cd9b96d92708ee525317fe9edbdb65ceaae85566e584de38a
SHA5126c14b36b25abe4c4ad4d2bcd977f336b1e80fbcffcb1eb667070a349796577f5b131fcf8285cd1e7ca2e8c95bbc95c45d37b9d5e37bf5f451d0e28596f3e3e21
-
Filesize
134KB
MD53b4f02ddbb280d67ae3b7ff50af96cb4
SHA15952598443181d29e072c64ab193a9b0c3c97bbb
SHA256701f2d67de96633279dd9008407f7526761e52f04fda4ec688cb5a68cbd17c64
SHA5124d63ac4441c4d8b5b7c9136e2c2dc8ecec6656b4eb36388e2ac1f91c83882b789f730402d2523e46779031d28e28d9c96ed6f5eff1eb7b12e3c670779a08815f