Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe
Resource
win7-20240903-en
General
-
Target
f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe
-
Size
96KB
-
MD5
3adba6ae7f2b460b4f81ee19b36401bb
-
SHA1
569c94a9087353c21d68f15d4ee2e6b8ac62bc75
-
SHA256
f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd
-
SHA512
a6d7694705f84b2824cf66ef8a1b5f780d7dec5d970409be78fcf4d89796330001b3f6831f22c61c7daff800b8a9fc66748bfca163e18b6cce654d3941f1d115
-
SSDEEP
1536:7nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:7Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1080 omsecor.exe 4144 omsecor.exe 3652 omsecor.exe 1704 omsecor.exe 4128 omsecor.exe 4916 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 516 set thread context of 4712 516 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 84 PID 1080 set thread context of 4144 1080 omsecor.exe 88 PID 3652 set thread context of 1704 3652 omsecor.exe 102 PID 4128 set thread context of 4916 4128 omsecor.exe 106 -
Program crash 4 IoCs
pid pid_target Process procid_target 4140 1080 WerFault.exe 86 1552 516 WerFault.exe 83 372 3652 WerFault.exe 101 4952 4128 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 516 wrote to memory of 4712 516 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 84 PID 516 wrote to memory of 4712 516 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 84 PID 516 wrote to memory of 4712 516 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 84 PID 516 wrote to memory of 4712 516 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 84 PID 516 wrote to memory of 4712 516 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 84 PID 4712 wrote to memory of 1080 4712 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 86 PID 4712 wrote to memory of 1080 4712 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 86 PID 4712 wrote to memory of 1080 4712 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 86 PID 1080 wrote to memory of 4144 1080 omsecor.exe 88 PID 1080 wrote to memory of 4144 1080 omsecor.exe 88 PID 1080 wrote to memory of 4144 1080 omsecor.exe 88 PID 1080 wrote to memory of 4144 1080 omsecor.exe 88 PID 1080 wrote to memory of 4144 1080 omsecor.exe 88 PID 4144 wrote to memory of 3652 4144 omsecor.exe 101 PID 4144 wrote to memory of 3652 4144 omsecor.exe 101 PID 4144 wrote to memory of 3652 4144 omsecor.exe 101 PID 3652 wrote to memory of 1704 3652 omsecor.exe 102 PID 3652 wrote to memory of 1704 3652 omsecor.exe 102 PID 3652 wrote to memory of 1704 3652 omsecor.exe 102 PID 3652 wrote to memory of 1704 3652 omsecor.exe 102 PID 3652 wrote to memory of 1704 3652 omsecor.exe 102 PID 1704 wrote to memory of 4128 1704 omsecor.exe 104 PID 1704 wrote to memory of 4128 1704 omsecor.exe 104 PID 1704 wrote to memory of 4128 1704 omsecor.exe 104 PID 4128 wrote to memory of 4916 4128 omsecor.exe 106 PID 4128 wrote to memory of 4916 4128 omsecor.exe 106 PID 4128 wrote to memory of 4916 4128 omsecor.exe 106 PID 4128 wrote to memory of 4916 4128 omsecor.exe 106 PID 4128 wrote to memory of 4916 4128 omsecor.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe"C:\Users\Admin\AppData\Local\Temp\f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exeC:\Users\Admin\AppData\Local\Temp\f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 2568⤵
- Program crash
PID:4952
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 2926⤵
- Program crash
PID:372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 2644⤵
- Program crash
PID:4140
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 3002⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 516 -ip 5161⤵PID:1540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1080 -ip 10801⤵PID:744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3652 -ip 36521⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4128 -ip 41281⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD580a56363f6b5dac9a731472f8396ad7e
SHA18c3562601a8b400dda8b6269821cef081e15b0a3
SHA256a014c18c024d4af199644c3f258ade5062330094b65833b2ecc8042d05441a02
SHA512109191a846049f4be52b5a8332d7ea90e3d7687c354f5e1d169c516e642e4383fcbc1a2df3a4d113469f738b1d87db03cd8045b5186186b6b65b37c6d4d2bd97
-
Filesize
96KB
MD558feb5f50dc2105b23aa4a2782f3cefe
SHA15bee646c5bc19c249ea4d412a85ea80e5351674b
SHA256eb588dd9111342ff71a40b79e92098d703062f033987ad4861ee65b66946d194
SHA5129f5a18b2d2aa53de207f14e192dbcc45db2851cf5f4b518bc7523617e47bed52407d21c9926d4b45e6a27657479d1037fefcbfaf39d881fc2e5b7830f66ad0ee
-
Filesize
96KB
MD5b9004f24e30199a7fd64cca0897a2bc0
SHA1575a5de3bf2f19a2597c38746cd5019525724222
SHA2561136148ce75459c99bc448a34979350713544d79003ddcf6957007b7e1c06b94
SHA5127b0ad1c6601ba9d90de249cd95c2625a823309ac8846fd82ae18a9a440acfd6c7500b2bce84e8460c4d57e4da80c3049c97f62358ad97feb16ea1d9352cf1b0c