Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe
Resource
win7-20241023-en
General
-
Target
2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe
-
Size
134KB
-
MD5
3ec3676a6b7abe2484e9c50e4c7ec589
-
SHA1
4b88f104b7cf08b432aa246a2700db1e71748c8f
-
SHA256
2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11
-
SHA512
c5a6c1964305d99c2124a576d0b3f915af386a2135a3b8c14c806773506dffaca088ff58c018ac61418975e04129848adad97852660c4a181633e514e3cdb16f
-
SSDEEP
1536:1DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiF:ViRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1372 omsecor.exe 2356 omsecor.exe 2808 omsecor.exe 3876 omsecor.exe 4712 omsecor.exe 3816 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2364 set thread context of 1616 2364 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 83 PID 1372 set thread context of 2356 1372 omsecor.exe 87 PID 2808 set thread context of 3876 2808 omsecor.exe 110 PID 4712 set thread context of 3816 4712 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 4744 2364 WerFault.exe 82 676 1372 WerFault.exe 85 2364 2808 WerFault.exe 109 2572 4712 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1616 2364 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 83 PID 2364 wrote to memory of 1616 2364 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 83 PID 2364 wrote to memory of 1616 2364 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 83 PID 2364 wrote to memory of 1616 2364 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 83 PID 2364 wrote to memory of 1616 2364 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 83 PID 1616 wrote to memory of 1372 1616 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 85 PID 1616 wrote to memory of 1372 1616 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 85 PID 1616 wrote to memory of 1372 1616 2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe 85 PID 1372 wrote to memory of 2356 1372 omsecor.exe 87 PID 1372 wrote to memory of 2356 1372 omsecor.exe 87 PID 1372 wrote to memory of 2356 1372 omsecor.exe 87 PID 1372 wrote to memory of 2356 1372 omsecor.exe 87 PID 1372 wrote to memory of 2356 1372 omsecor.exe 87 PID 2356 wrote to memory of 2808 2356 omsecor.exe 109 PID 2356 wrote to memory of 2808 2356 omsecor.exe 109 PID 2356 wrote to memory of 2808 2356 omsecor.exe 109 PID 2808 wrote to memory of 3876 2808 omsecor.exe 110 PID 2808 wrote to memory of 3876 2808 omsecor.exe 110 PID 2808 wrote to memory of 3876 2808 omsecor.exe 110 PID 2808 wrote to memory of 3876 2808 omsecor.exe 110 PID 2808 wrote to memory of 3876 2808 omsecor.exe 110 PID 3876 wrote to memory of 4712 3876 omsecor.exe 112 PID 3876 wrote to memory of 4712 3876 omsecor.exe 112 PID 3876 wrote to memory of 4712 3876 omsecor.exe 112 PID 4712 wrote to memory of 3816 4712 omsecor.exe 114 PID 4712 wrote to memory of 3816 4712 omsecor.exe 114 PID 4712 wrote to memory of 3816 4712 omsecor.exe 114 PID 4712 wrote to memory of 3816 4712 omsecor.exe 114 PID 4712 wrote to memory of 3816 4712 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe"C:\Users\Admin\AppData\Local\Temp\2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exeC:\Users\Admin\AppData\Local\Temp\2392e1c3406dbe8d715a8e2d84625941c6f887f4106890645935f2f842439a11.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 2568⤵
- Program crash
PID:2572
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 2926⤵
- Program crash
PID:2364
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 3004⤵
- Program crash
PID:676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 3002⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2364 -ip 23641⤵PID:3188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1372 -ip 13721⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2808 -ip 28081⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4712 -ip 47121⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD510f134e260666acc7c743fdec68269a4
SHA1174236effcae671b7432b517067520c049c14eb4
SHA25612069596928c3b261f98a8d609da14ddb3a604d5653df61d9657746870246c67
SHA512f9478bea6866c58fcfb4aba1c6c7a55592bb4b9c234c48be038c89e7392b0fc0a5f4a9ec5d76c6224d3ffe1a7e9ccf0b3c2ac13f4755dfc9bd809510ba7dfcbb
-
Filesize
134KB
MD5058a081e15562c868978d4a42435ad42
SHA17ab21d4622866fee92fc10c2ddaf1d499e544001
SHA2563821a156e60289477024c7d01a234030ba2f21727cc1b4e49eef1860df10abc7
SHA512a728f797753be8b08bf3298c8d7c3b3e58d77197ee7cd319033a87f18baeaf5a4868d294a31f1303b1e00df7af119d815753bc67acbf6d2bc0ac949ac994aee4
-
Filesize
134KB
MD54cb812a05eb6af59bd0c5dd82465836e
SHA194d9ba382ff9c71ceefcd5a86923530094a01a0d
SHA25643b55e39af8143a0fecdf9a086f1ad12bb2f78c04b5465985869f106e6c46990
SHA512bb4ba3675216ab6c5fa96401329a2ba2297214412f6359db2bdcbb9f6067bdb04aa90e2e4d35abe37d1283a7a247a960633ea2b7373867d34c1737974ced991a