Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe
Resource
win7-20241023-en
General
-
Target
5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe
-
Size
96KB
-
MD5
ca3c01db3d967edf3d69a5d99266b880
-
SHA1
078f6b20d345d895fdb61cc1874ff6bdc44e91a3
-
SHA256
5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22a
-
SHA512
d70c02dd3f4e4d26d137f4fa971b6aa5577930f180e1ec98c19ee6a24a28936f17d3388671a8c2851ccf7905dc5eb25413c8bddd85ef383bb800f9c748152186
-
SSDEEP
1536:JnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:JGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3528 omsecor.exe 3656 omsecor.exe 2336 omsecor.exe 3784 omsecor.exe 2756 omsecor.exe 3136 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3484 set thread context of 4588 3484 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 83 PID 3528 set thread context of 3656 3528 omsecor.exe 87 PID 2336 set thread context of 3784 2336 omsecor.exe 108 PID 2756 set thread context of 3136 2756 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 2736 3484 WerFault.exe 82 4684 3528 WerFault.exe 85 4008 2336 WerFault.exe 107 668 2756 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4588 3484 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 83 PID 3484 wrote to memory of 4588 3484 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 83 PID 3484 wrote to memory of 4588 3484 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 83 PID 3484 wrote to memory of 4588 3484 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 83 PID 3484 wrote to memory of 4588 3484 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 83 PID 4588 wrote to memory of 3528 4588 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 85 PID 4588 wrote to memory of 3528 4588 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 85 PID 4588 wrote to memory of 3528 4588 5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe 85 PID 3528 wrote to memory of 3656 3528 omsecor.exe 87 PID 3528 wrote to memory of 3656 3528 omsecor.exe 87 PID 3528 wrote to memory of 3656 3528 omsecor.exe 87 PID 3528 wrote to memory of 3656 3528 omsecor.exe 87 PID 3528 wrote to memory of 3656 3528 omsecor.exe 87 PID 3656 wrote to memory of 2336 3656 omsecor.exe 107 PID 3656 wrote to memory of 2336 3656 omsecor.exe 107 PID 3656 wrote to memory of 2336 3656 omsecor.exe 107 PID 2336 wrote to memory of 3784 2336 omsecor.exe 108 PID 2336 wrote to memory of 3784 2336 omsecor.exe 108 PID 2336 wrote to memory of 3784 2336 omsecor.exe 108 PID 2336 wrote to memory of 3784 2336 omsecor.exe 108 PID 2336 wrote to memory of 3784 2336 omsecor.exe 108 PID 3784 wrote to memory of 2756 3784 omsecor.exe 110 PID 3784 wrote to memory of 2756 3784 omsecor.exe 110 PID 3784 wrote to memory of 2756 3784 omsecor.exe 110 PID 2756 wrote to memory of 3136 2756 omsecor.exe 112 PID 2756 wrote to memory of 3136 2756 omsecor.exe 112 PID 2756 wrote to memory of 3136 2756 omsecor.exe 112 PID 2756 wrote to memory of 3136 2756 omsecor.exe 112 PID 2756 wrote to memory of 3136 2756 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe"C:\Users\Admin\AppData\Local\Temp\5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exeC:\Users\Admin\AppData\Local\Temp\5129f83e8b4fc95f8832307fe82875a8f31349625d3333b27e50007354f0f22aN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 2568⤵
- Program crash
PID:668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 2926⤵
- Program crash
PID:4008
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3528 -s 3004⤵
- Program crash
PID:4684
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 2882⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3484 -ip 34841⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3528 -ip 35281⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2336 -ip 23361⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2756 -ip 27561⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5975d457cb800077d56b181285b4aecf1
SHA148836d8522f640ed1954fa08af72c3e84537534f
SHA256659007a1458582287d163bc495664b4e88d31487e58696ef276837b3ba48bb2f
SHA512b4ac40853ef1cbc90aedf21ffad4ba22b5689ef14980b674af267270a76acd498a99a1e1e84e99e70db592218bc16ddcf0a3c9a671cf14158e006596bfb4acd3
-
Filesize
96KB
MD53da1dd1af6e39f65b9b653a941c701bc
SHA1703f2dbc6da9b27771c951094b192288e81c43e7
SHA256b3b3ba05b7e716670328600b19a4a5099abbd2a4ad846e16f5df24e985bdf681
SHA5127f8c5c8a42c3c2565c80592ad4d119a9475d78e8c107dffbd71d5263fe5383f43a67e5f77365ceeb3d92e0eddd8a2766b669930048eaf34324293db931c07d18
-
Filesize
96KB
MD5cfaa87961021381b909056c37573afa8
SHA169ccbe05e602d8687305f2c67fab60323eacb86b
SHA2562f9471d95597c6a3ad4d933881c131405dcc418e3f985df8a3478bd3df848185
SHA512d50f803fde4f34211714bf113bb6781f22987d3c971fcef584a5c2abfbf2b6288bdcc61d659b881bf498efe04c2d40c83e3b5398f1752a8669a2a48795468e48