Analysis
-
max time kernel
114s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe
Resource
win7-20240729-en
General
-
Target
c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe
-
Size
96KB
-
MD5
e0fad41a8a5e4cf2c8b82e0719721a90
-
SHA1
95d718867024a2e636d1eab38a4dea6ebe3b5388
-
SHA256
c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320b
-
SHA512
b986901c89a82c70e3d72ad7a59ad2e92e02920a57b1115c4f5705247d69d10596a52d828dad3b22444da6938e63e946d0c75a1f937337c5c1ff9c990d778414
-
SSDEEP
1536:6nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:6Gs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4072 omsecor.exe 1864 omsecor.exe 3636 omsecor.exe 2372 omsecor.exe 3308 omsecor.exe 5080 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4316 set thread context of 2380 4316 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 83 PID 4072 set thread context of 1864 4072 omsecor.exe 88 PID 3636 set thread context of 2372 3636 omsecor.exe 109 PID 3308 set thread context of 5080 3308 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 3528 4316 WerFault.exe 82 644 4072 WerFault.exe 85 912 3636 WerFault.exe 108 1816 3308 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4316 wrote to memory of 2380 4316 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 83 PID 4316 wrote to memory of 2380 4316 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 83 PID 4316 wrote to memory of 2380 4316 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 83 PID 4316 wrote to memory of 2380 4316 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 83 PID 4316 wrote to memory of 2380 4316 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 83 PID 2380 wrote to memory of 4072 2380 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 85 PID 2380 wrote to memory of 4072 2380 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 85 PID 2380 wrote to memory of 4072 2380 c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe 85 PID 4072 wrote to memory of 1864 4072 omsecor.exe 88 PID 4072 wrote to memory of 1864 4072 omsecor.exe 88 PID 4072 wrote to memory of 1864 4072 omsecor.exe 88 PID 4072 wrote to memory of 1864 4072 omsecor.exe 88 PID 4072 wrote to memory of 1864 4072 omsecor.exe 88 PID 1864 wrote to memory of 3636 1864 omsecor.exe 108 PID 1864 wrote to memory of 3636 1864 omsecor.exe 108 PID 1864 wrote to memory of 3636 1864 omsecor.exe 108 PID 3636 wrote to memory of 2372 3636 omsecor.exe 109 PID 3636 wrote to memory of 2372 3636 omsecor.exe 109 PID 3636 wrote to memory of 2372 3636 omsecor.exe 109 PID 3636 wrote to memory of 2372 3636 omsecor.exe 109 PID 3636 wrote to memory of 2372 3636 omsecor.exe 109 PID 2372 wrote to memory of 3308 2372 omsecor.exe 111 PID 2372 wrote to memory of 3308 2372 omsecor.exe 111 PID 2372 wrote to memory of 3308 2372 omsecor.exe 111 PID 3308 wrote to memory of 5080 3308 omsecor.exe 113 PID 3308 wrote to memory of 5080 3308 omsecor.exe 113 PID 3308 wrote to memory of 5080 3308 omsecor.exe 113 PID 3308 wrote to memory of 5080 3308 omsecor.exe 113 PID 3308 wrote to memory of 5080 3308 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe"C:\Users\Admin\AppData\Local\Temp\c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exeC:\Users\Admin\AppData\Local\Temp\c1a3ccfcfcc93958f158a9f4a94af094445cd91735c6788e0ce208dd8825320bN.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 2688⤵
- Program crash
PID:1816
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 2926⤵
- Program crash
PID:912
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4072 -s 2924⤵
- Program crash
PID:644
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 2882⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4316 -ip 43161⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4072 -ip 40721⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3636 -ip 36361⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3308 -ip 33081⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5026690d5f60c1cc21b4bb6345c3d2d18
SHA17a8a86ba3f1637656a3474e032877889f7095979
SHA256cd1a171b8158ae9b7344719d6b4d6a7f4712e19eccc24b0a27ccbfd6aa66b55d
SHA51206b9824f595ba5fd657f3e478a82f06eb047f8b2ba275767403e6afc161e74e87098d386f917e943097a44673ad7653b96819bb68f73476b1a2eeed4458f0d6c
-
Filesize
96KB
MD5c454b1a2c14d49b5e2e37169e2f488fb
SHA1f69c22cdfdcee04625161f26f4d3c367dc58ebff
SHA2567258a860ff45345097584a9d0bca3c304dfcc48da620bde1041d7a9b7fada09e
SHA512258f3a59b2b6a18ceb720eaa0462131732330a1f88c7667559b14265d7e3818151d071dfe86f8a514c0ef8d3399a94c7ed4fd06b8ea9fb69e19ee142cb176c72
-
Filesize
96KB
MD5ff39135e9c757e8135f30545aee6374c
SHA1de48afa590d0c57123e72962f402e151d1566435
SHA25687d4689b5bc629b01d59c89dac1a0810497eb17191f06df0597a6b701c9c5193
SHA5120babab5bf6ed867deb400032c9c3f44961b84ffe6e701846244d7f14e2e3a2ffbd0cb45d0c04e85fee15d1986ca47055290e84646ab504b6d30d8696fe351b31