Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe
Resource
win7-20240903-en
General
-
Target
69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe
-
Size
96KB
-
MD5
a328aa3fd251b34ef2f6b5792ceca650
-
SHA1
76d9c111bbbda4288ec3321304353597d68150d7
-
SHA256
69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563
-
SHA512
b21b63f526df378d8b6a7309f27d7175860a2ecfedb4395f25654267894ede5fa343ac23a0c4bb2d6cbdfda7f2982795251eec65b9cae05d4f28ddac2f20a2e7
-
SSDEEP
1536:nnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxO:nGs8cd8eXlYairZYqMddH13O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 556 omsecor.exe 216 omsecor.exe 2348 omsecor.exe 1596 omsecor.exe 2148 omsecor.exe 3672 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3512 set thread context of 1220 3512 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 83 PID 556 set thread context of 216 556 omsecor.exe 88 PID 2348 set thread context of 1596 2348 omsecor.exe 108 PID 2148 set thread context of 3672 2148 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4900 3512 WerFault.exe 82 3824 556 WerFault.exe 86 2740 2348 WerFault.exe 107 1664 2148 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3512 wrote to memory of 1220 3512 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 83 PID 3512 wrote to memory of 1220 3512 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 83 PID 3512 wrote to memory of 1220 3512 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 83 PID 3512 wrote to memory of 1220 3512 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 83 PID 3512 wrote to memory of 1220 3512 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 83 PID 1220 wrote to memory of 556 1220 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 86 PID 1220 wrote to memory of 556 1220 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 86 PID 1220 wrote to memory of 556 1220 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 86 PID 556 wrote to memory of 216 556 omsecor.exe 88 PID 556 wrote to memory of 216 556 omsecor.exe 88 PID 556 wrote to memory of 216 556 omsecor.exe 88 PID 556 wrote to memory of 216 556 omsecor.exe 88 PID 556 wrote to memory of 216 556 omsecor.exe 88 PID 216 wrote to memory of 2348 216 omsecor.exe 107 PID 216 wrote to memory of 2348 216 omsecor.exe 107 PID 216 wrote to memory of 2348 216 omsecor.exe 107 PID 2348 wrote to memory of 1596 2348 omsecor.exe 108 PID 2348 wrote to memory of 1596 2348 omsecor.exe 108 PID 2348 wrote to memory of 1596 2348 omsecor.exe 108 PID 2348 wrote to memory of 1596 2348 omsecor.exe 108 PID 2348 wrote to memory of 1596 2348 omsecor.exe 108 PID 1596 wrote to memory of 2148 1596 omsecor.exe 110 PID 1596 wrote to memory of 2148 1596 omsecor.exe 110 PID 1596 wrote to memory of 2148 1596 omsecor.exe 110 PID 2148 wrote to memory of 3672 2148 omsecor.exe 112 PID 2148 wrote to memory of 3672 2148 omsecor.exe 112 PID 2148 wrote to memory of 3672 2148 omsecor.exe 112 PID 2148 wrote to memory of 3672 2148 omsecor.exe 112 PID 2148 wrote to memory of 3672 2148 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe"C:\Users\Admin\AppData\Local\Temp\69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exeC:\Users\Admin\AppData\Local\Temp\69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 2568⤵
- Program crash
PID:1664
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 2926⤵
- Program crash
PID:2740
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 3004⤵
- Program crash
PID:3824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 2882⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3512 -ip 35121⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 556 -ip 5561⤵PID:3388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2348 -ip 23481⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2148 -ip 21481⤵PID:4336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f2fe70947568d0ff1925b589eff71233
SHA1d9747ee961c6aef6542da20812f7f2d12dc74876
SHA2564670ca54518306ea91d5a2a6055c53f8b8348b9de57dc58088652f014b9a9400
SHA512f8ef622d05dc0f989ca20f7a72f953302396f5d6ee3621d7e943cfdf37caa1cf51231f882c5de74f9e284b1a4e082b192038610f0391208ff0ee9e4a6d38b549
-
Filesize
96KB
MD553d0a875d5b382e394c35c17e2af1f01
SHA1976cdc39410acccc6eb0f316486cf78da4265336
SHA2563d3b2af1ed4fc0aaf9c4e9e9b66c4dcbd0a2b5340c5442cbe7037d1b8dbe5bea
SHA51217f1da62be411d8e3362700acdd9918b7524a1024b50e08b03ceeefd29b06e45da702e8b7817180f02633ad04153e21a471b6cf61d8fc4f80fabc49467b7784f
-
Filesize
96KB
MD501999173d6e54be31e2fd97201e50d94
SHA1a15bc11f534659a3a37f8e9a4d8c92ae372dd7e8
SHA25625e85b081b89009c72473ddb9874ad29f4a95c48b2980f2ce42fb20c56a2ff96
SHA5120b84742bab4859d94c9dac3da654a779fbdcbdb70da4ea8400ca47e33f339902242eff62a5c66b6d1df41d108b8b234b91df5d3c5f08a83ef44b7beece5a19aa