Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe
Resource
win7-20240729-en
General
-
Target
69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe
-
Size
96KB
-
MD5
a328aa3fd251b34ef2f6b5792ceca650
-
SHA1
76d9c111bbbda4288ec3321304353597d68150d7
-
SHA256
69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563
-
SHA512
b21b63f526df378d8b6a7309f27d7175860a2ecfedb4395f25654267894ede5fa343ac23a0c4bb2d6cbdfda7f2982795251eec65b9cae05d4f28ddac2f20a2e7
-
SSDEEP
1536:nnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxO:nGs8cd8eXlYairZYqMddH13O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1276 omsecor.exe 2248 omsecor.exe 448 omsecor.exe 4940 omsecor.exe 4376 omsecor.exe 4100 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4412 set thread context of 4544 4412 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 84 PID 1276 set thread context of 2248 1276 omsecor.exe 88 PID 448 set thread context of 4940 448 omsecor.exe 109 PID 4376 set thread context of 4100 4376 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 3288 1276 WerFault.exe 86 3212 4412 WerFault.exe 83 2852 448 WerFault.exe 108 1964 4376 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4544 4412 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 84 PID 4412 wrote to memory of 4544 4412 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 84 PID 4412 wrote to memory of 4544 4412 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 84 PID 4412 wrote to memory of 4544 4412 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 84 PID 4412 wrote to memory of 4544 4412 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 84 PID 4544 wrote to memory of 1276 4544 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 86 PID 4544 wrote to memory of 1276 4544 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 86 PID 4544 wrote to memory of 1276 4544 69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe 86 PID 1276 wrote to memory of 2248 1276 omsecor.exe 88 PID 1276 wrote to memory of 2248 1276 omsecor.exe 88 PID 1276 wrote to memory of 2248 1276 omsecor.exe 88 PID 1276 wrote to memory of 2248 1276 omsecor.exe 88 PID 1276 wrote to memory of 2248 1276 omsecor.exe 88 PID 2248 wrote to memory of 448 2248 omsecor.exe 108 PID 2248 wrote to memory of 448 2248 omsecor.exe 108 PID 2248 wrote to memory of 448 2248 omsecor.exe 108 PID 448 wrote to memory of 4940 448 omsecor.exe 109 PID 448 wrote to memory of 4940 448 omsecor.exe 109 PID 448 wrote to memory of 4940 448 omsecor.exe 109 PID 448 wrote to memory of 4940 448 omsecor.exe 109 PID 448 wrote to memory of 4940 448 omsecor.exe 109 PID 4940 wrote to memory of 4376 4940 omsecor.exe 111 PID 4940 wrote to memory of 4376 4940 omsecor.exe 111 PID 4940 wrote to memory of 4376 4940 omsecor.exe 111 PID 4376 wrote to memory of 4100 4376 omsecor.exe 112 PID 4376 wrote to memory of 4100 4376 omsecor.exe 112 PID 4376 wrote to memory of 4100 4376 omsecor.exe 112 PID 4376 wrote to memory of 4100 4376 omsecor.exe 112 PID 4376 wrote to memory of 4100 4376 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe"C:\Users\Admin\AppData\Local\Temp\69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exeC:\Users\Admin\AppData\Local\Temp\69e911d6f0942e1f72e2d9b976d0a23c6dbdf9a568f1274ad6aeb70330d93563.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 2688⤵
- Program crash
PID:1964
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 3006⤵
- Program crash
PID:2852
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 2924⤵
- Program crash
PID:3288
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 2722⤵
- Program crash
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4412 -ip 44121⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1276 -ip 12761⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 448 -ip 4481⤵PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4376 -ip 43761⤵PID:3768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD553d0a875d5b382e394c35c17e2af1f01
SHA1976cdc39410acccc6eb0f316486cf78da4265336
SHA2563d3b2af1ed4fc0aaf9c4e9e9b66c4dcbd0a2b5340c5442cbe7037d1b8dbe5bea
SHA51217f1da62be411d8e3362700acdd9918b7524a1024b50e08b03ceeefd29b06e45da702e8b7817180f02633ad04153e21a471b6cf61d8fc4f80fabc49467b7784f
-
Filesize
96KB
MD581f53e3ac20a63a93840135c8600161d
SHA14eb9c538187cda32e0ae5ddce84284f87ae1a1e5
SHA25623acda87b5623ad9903ade45b0b8bb366b576fd51cd3ec84dac1a90bbd61ffb9
SHA512874cad52e96be340bcf198c5a585e869de32f53b6e432c8e7985c219128186a6e706b94221230fb632a79203c5e8c95bffa33a8834e9230da159ce4e97aaace3
-
Filesize
96KB
MD5c83d840de86dbef6fb9b3c6100fe9bdd
SHA1aacaddeec311eaba7f7d57ccc7e1a0674986d2ef
SHA2567d07ec9b7f616b4e245102b8b2809bf1669a4b0e2880b0a2e4989bc96cc42471
SHA5121fe4a9d44f648890832f4581178ea5b4adc0a872b1d6c40d6464940c823ec4c34b75d07fddc54085a5af6259f5d797e7ab8d87535070b86002e8a10d5f9b380d