Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe
Resource
win7-20240903-en
General
-
Target
c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe
-
Size
96KB
-
MD5
da97c6e72c9bd21569f357bbb0f30bc0
-
SHA1
e9dbfc9a7ecd11b4cca28f46053ccfda43e3a502
-
SHA256
c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7e
-
SHA512
7f45e174e326a791e9b5f164aae1930b237caeefd2159064f3c796ffc22147c1b7fe0533e6601072b5d772bea61fd5709b403b30dbd1945a502c7bf7a5308673
-
SSDEEP
1536:2nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:2Gs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4728 omsecor.exe 4564 omsecor.exe 2756 omsecor.exe 1204 omsecor.exe 2212 omsecor.exe 4360 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3548 set thread context of 1016 3548 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 83 PID 4728 set thread context of 4564 4728 omsecor.exe 87 PID 2756 set thread context of 1204 2756 omsecor.exe 109 PID 2212 set thread context of 4360 2212 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4588 4728 WerFault.exe 86 3948 3548 WerFault.exe 82 4112 2756 WerFault.exe 108 4424 2212 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3548 wrote to memory of 1016 3548 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 83 PID 3548 wrote to memory of 1016 3548 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 83 PID 3548 wrote to memory of 1016 3548 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 83 PID 3548 wrote to memory of 1016 3548 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 83 PID 3548 wrote to memory of 1016 3548 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 83 PID 1016 wrote to memory of 4728 1016 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 86 PID 1016 wrote to memory of 4728 1016 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 86 PID 1016 wrote to memory of 4728 1016 c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe 86 PID 4728 wrote to memory of 4564 4728 omsecor.exe 87 PID 4728 wrote to memory of 4564 4728 omsecor.exe 87 PID 4728 wrote to memory of 4564 4728 omsecor.exe 87 PID 4728 wrote to memory of 4564 4728 omsecor.exe 87 PID 4728 wrote to memory of 4564 4728 omsecor.exe 87 PID 4564 wrote to memory of 2756 4564 omsecor.exe 108 PID 4564 wrote to memory of 2756 4564 omsecor.exe 108 PID 4564 wrote to memory of 2756 4564 omsecor.exe 108 PID 2756 wrote to memory of 1204 2756 omsecor.exe 109 PID 2756 wrote to memory of 1204 2756 omsecor.exe 109 PID 2756 wrote to memory of 1204 2756 omsecor.exe 109 PID 2756 wrote to memory of 1204 2756 omsecor.exe 109 PID 2756 wrote to memory of 1204 2756 omsecor.exe 109 PID 1204 wrote to memory of 2212 1204 omsecor.exe 111 PID 1204 wrote to memory of 2212 1204 omsecor.exe 111 PID 1204 wrote to memory of 2212 1204 omsecor.exe 111 PID 2212 wrote to memory of 4360 2212 omsecor.exe 112 PID 2212 wrote to memory of 4360 2212 omsecor.exe 112 PID 2212 wrote to memory of 4360 2212 omsecor.exe 112 PID 2212 wrote to memory of 4360 2212 omsecor.exe 112 PID 2212 wrote to memory of 4360 2212 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe"C:\Users\Admin\AppData\Local\Temp\c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exeC:\Users\Admin\AppData\Local\Temp\c910139737601d416d81760922cbab3f7fc5b009ab7c121b33e92cdd8898fe7eN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 2568⤵
- Program crash
PID:4424
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 3006⤵
- Program crash
PID:4112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 2884⤵
- Program crash
PID:4588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 2882⤵
- Program crash
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3548 -ip 35481⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4728 -ip 47281⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2756 -ip 27561⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2212 -ip 22121⤵PID:4276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d9eee85f6cfd1564c23ccd99200f0684
SHA1c9fff9e3b2a6b120b44f26b6ea2e6d36103c9b31
SHA256f848ac7a1197ecf908a0963e93ef4e8795180b00ad6b40f6c3f12a0486227511
SHA51222ff80f9cef196717e88f6d5122d069fc6ca813ad8b0bf197a6bd5ece53cc467113c1c0cccf40da982469007d4ce5bc52cede8a33a2403084f214c9ae6a51b2e
-
Filesize
96KB
MD56318c4f9bb42c058fe0650a435c483c2
SHA1f4edf17ad30ae826d35323e7295defdf30dbc132
SHA256b1fcef37afeaf2f0b42809f83472248442d2f634778bde10ade00846dd602ab3
SHA512ece2dbdf6d7d5a006266bd9802bed5e6e056b1f34f20f1285e045afdc57ac1d2622521d3920e329a6e81dfd2084cf77c7bf1ba438d28d535fbcbb4bed24f316b
-
Filesize
96KB
MD5e108d95e3a8c0e1dd6bc5af175a9622f
SHA12dda2a1ec8b458499ca7c0fb13a965dea8e01a85
SHA2567bb2f13591e2bf6e22936fad98d5e356affc5c16e58cc826f84260f3158961c1
SHA5124c66b9fb4825cfed93932a604e9f10219c1b3cbca9a7aaf358e7b50c0486745761e5466724cca95f50fb7621a0e44475142574bbc4a2970367a0f329df99dc6f