Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 12:17
Static task
static1
Behavioral task
behavioral1
Sample
f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe
Resource
win7-20241023-en
General
-
Target
f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe
-
Size
96KB
-
MD5
387ab07cb92996adfd023c9dff37a8ae
-
SHA1
176de07c60e6af19833c8b4243a34774beb56533
-
SHA256
f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6
-
SHA512
aa6d659c94f27baffb2d7e223073969075706bca1933b43e47193e4a3a5d5196d3a4de1faa8a767340d17c6fe5cb9ff81def7a7d07783d7735fc904abfacf8b5
-
SSDEEP
1536:JnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:JGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2256 omsecor.exe 3988 omsecor.exe 2320 omsecor.exe 4472 omsecor.exe 4852 omsecor.exe 3716 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4024 set thread context of 4812 4024 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 83 PID 2256 set thread context of 3988 2256 omsecor.exe 87 PID 2320 set thread context of 4472 2320 omsecor.exe 101 PID 4852 set thread context of 3716 4852 omsecor.exe 105 -
Program crash 4 IoCs
pid pid_target Process procid_target 3956 4024 WerFault.exe 82 3616 2256 WerFault.exe 85 4200 2320 WerFault.exe 100 4520 4852 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4812 4024 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 83 PID 4024 wrote to memory of 4812 4024 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 83 PID 4024 wrote to memory of 4812 4024 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 83 PID 4024 wrote to memory of 4812 4024 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 83 PID 4024 wrote to memory of 4812 4024 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 83 PID 4812 wrote to memory of 2256 4812 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 85 PID 4812 wrote to memory of 2256 4812 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 85 PID 4812 wrote to memory of 2256 4812 f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe 85 PID 2256 wrote to memory of 3988 2256 omsecor.exe 87 PID 2256 wrote to memory of 3988 2256 omsecor.exe 87 PID 2256 wrote to memory of 3988 2256 omsecor.exe 87 PID 2256 wrote to memory of 3988 2256 omsecor.exe 87 PID 2256 wrote to memory of 3988 2256 omsecor.exe 87 PID 3988 wrote to memory of 2320 3988 omsecor.exe 100 PID 3988 wrote to memory of 2320 3988 omsecor.exe 100 PID 3988 wrote to memory of 2320 3988 omsecor.exe 100 PID 2320 wrote to memory of 4472 2320 omsecor.exe 101 PID 2320 wrote to memory of 4472 2320 omsecor.exe 101 PID 2320 wrote to memory of 4472 2320 omsecor.exe 101 PID 2320 wrote to memory of 4472 2320 omsecor.exe 101 PID 2320 wrote to memory of 4472 2320 omsecor.exe 101 PID 4472 wrote to memory of 4852 4472 omsecor.exe 103 PID 4472 wrote to memory of 4852 4472 omsecor.exe 103 PID 4472 wrote to memory of 4852 4472 omsecor.exe 103 PID 4852 wrote to memory of 3716 4852 omsecor.exe 105 PID 4852 wrote to memory of 3716 4852 omsecor.exe 105 PID 4852 wrote to memory of 3716 4852 omsecor.exe 105 PID 4852 wrote to memory of 3716 4852 omsecor.exe 105 PID 4852 wrote to memory of 3716 4852 omsecor.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe"C:\Users\Admin\AppData\Local\Temp\f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exeC:\Users\Admin\AppData\Local\Temp\f1de45b2c0d4a42ee7e8ad45b6e37f96c2c5683667eaa6c517de51e08fe8d5b6.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 2568⤵
- Program crash
PID:4520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 2926⤵
- Program crash
PID:4200
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 2884⤵
- Program crash
PID:3616
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 2882⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4024 -ip 40241⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2256 -ip 22561⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2320 -ip 23201⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4852 -ip 48521⤵PID:4324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5933d6255cb6f901b0ab32d3277ad9453
SHA1bce7022952332dbd727e54ae91628a387a12d5e8
SHA25621b4aa15fc516cdc72aaaf4405a21a703c3f2d1a29eeb51ff2fbb9a94b118328
SHA51222fca6cb230fe0a77b68471bf11f79e7e5607fe8fed514eedf48ca4eab589bbb02725cd3bfdd4ee48d7922027686df0557d184ff00a4891aa34e80590c7b15be
-
Filesize
96KB
MD5752cf48f37d5a717ba2d964e200ad7c7
SHA1ca6611e84981a214e437f01e706c810b9b061c22
SHA25678d5a89213c5ebef5ddbff44668ce642ec62b2d4c1e7b3366f3490c3bb12575a
SHA51214be2af8a70783c60899d4145334c50f094a54a6890a4e6b501e8dbdc7a1fcccdb0e221e2071ec0c5f726b4a54bac968a35e2548159cec5b72e6171b088e39a2
-
Filesize
96KB
MD54fd1df3e3e1481b9d3b3d27cb3b77b6e
SHA1f1b48995159b2acb41632fb76753c74a3ab0dcb3
SHA256367c86839b84e59e0bf5a7098721dddf930e59c57f4eb6cdbfc1b1e54811e1f9
SHA51251352fb74d34e220c0a22bb716d1c12b70936cc26463971c319934fd4d2dc48b42bb4f858b2db4fa08d5d69e667ce7f3a0fc9a7ed695d6266511390124377dd7