Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe
Resource
win7-20240903-en
General
-
Target
c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe
-
Size
96KB
-
MD5
e3c633e3a73e66f06a4191e7412c3bf0
-
SHA1
32f994aef5edacda4cc4a54b86e0787415e53461
-
SHA256
c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1
-
SHA512
4800b7fcc0bf6fbe2546ee3c58899112b79909e52efb480ab93377093f1422a401c6c8e86fb68b15c8ff28c3b2188e4cf229e4b5887a1a4a2b5d17cba992e476
-
SSDEEP
1536:7nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:7Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2256 omsecor.exe 420 omsecor.exe 3840 omsecor.exe 2544 omsecor.exe 2896 omsecor.exe 2244 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2716 set thread context of 2900 2716 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 83 PID 2256 set thread context of 420 2256 omsecor.exe 88 PID 3840 set thread context of 2544 3840 omsecor.exe 101 PID 2896 set thread context of 2244 2896 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 2532 2716 WerFault.exe 82 4940 2256 WerFault.exe 86 3716 3840 WerFault.exe 100 4520 2896 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2900 2716 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 83 PID 2716 wrote to memory of 2900 2716 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 83 PID 2716 wrote to memory of 2900 2716 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 83 PID 2716 wrote to memory of 2900 2716 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 83 PID 2716 wrote to memory of 2900 2716 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 83 PID 2900 wrote to memory of 2256 2900 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 86 PID 2900 wrote to memory of 2256 2900 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 86 PID 2900 wrote to memory of 2256 2900 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 86 PID 2256 wrote to memory of 420 2256 omsecor.exe 88 PID 2256 wrote to memory of 420 2256 omsecor.exe 88 PID 2256 wrote to memory of 420 2256 omsecor.exe 88 PID 2256 wrote to memory of 420 2256 omsecor.exe 88 PID 2256 wrote to memory of 420 2256 omsecor.exe 88 PID 420 wrote to memory of 3840 420 omsecor.exe 100 PID 420 wrote to memory of 3840 420 omsecor.exe 100 PID 420 wrote to memory of 3840 420 omsecor.exe 100 PID 3840 wrote to memory of 2544 3840 omsecor.exe 101 PID 3840 wrote to memory of 2544 3840 omsecor.exe 101 PID 3840 wrote to memory of 2544 3840 omsecor.exe 101 PID 3840 wrote to memory of 2544 3840 omsecor.exe 101 PID 3840 wrote to memory of 2544 3840 omsecor.exe 101 PID 2544 wrote to memory of 2896 2544 omsecor.exe 103 PID 2544 wrote to memory of 2896 2544 omsecor.exe 103 PID 2544 wrote to memory of 2896 2544 omsecor.exe 103 PID 2896 wrote to memory of 2244 2896 omsecor.exe 104 PID 2896 wrote to memory of 2244 2896 omsecor.exe 104 PID 2896 wrote to memory of 2244 2896 omsecor.exe 104 PID 2896 wrote to memory of 2244 2896 omsecor.exe 104 PID 2896 wrote to memory of 2244 2896 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe"C:\Users\Admin\AppData\Local\Temp\c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exeC:\Users\Admin\AppData\Local\Temp\c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 2568⤵
- Program crash
PID:4520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 2926⤵
- Program crash
PID:3716
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 2924⤵
- Program crash
PID:4940
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 2882⤵
- Program crash
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2716 -ip 27161⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2256 -ip 22561⤵PID:1512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3840 -ip 38401⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2896 -ip 28961⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD54308fbaabd117a6f781824fc2887f32d
SHA17bc3b981bddc8665ee525208d59d6de843a77d8a
SHA256bfbc33a1966f9c2ba2daa6a2fcd2b86d7f0f6fa9c2738f95b85becbca6a6c8fe
SHA512b806f016046bedb88f9da606772b2767c02b60e095be3ef8828fc87b86fbdb9a8ad0d4a9cb33aa7b836c05ecb38194f259356f713ef845dbb308df62e4e10962
-
Filesize
96KB
MD52f302f500edee250920957482838a1dc
SHA1e43fef95c39d303ade69a53c01918ff043a08987
SHA25654b5ff8763932bc56faa588957a2adec0280f75849219943a0f38cac61ece5be
SHA512a469f4668e752a054f863bf632a07ec7daf1ef62524b0eaf53409fd220d09b5d328bf7e40ed9d79cde49067ce2415574c1d71080e0f95cafac30fca1c2459f8f
-
Filesize
96KB
MD5f3eca57d05dbfd48aa64674dcc565f31
SHA1b9639cb9401ca9bb6d4b64be91f2e3ca7435ae21
SHA25609ba5f6bf754933e3d0f9cfbf17eee6cb1928cf9a154fce7dfd927595869537b
SHA512918c129df30f4cbd9cee1828c8a73d1faeb45e4ab2f4d799b799c20a4027988350dbf3f065c9bf1124be2fe19178e3b8f0763abee43f0ca72273899d29abcaa6