Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe
Resource
win7-20240903-en
General
-
Target
0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe
-
Size
96KB
-
MD5
1d3f9f35f940830fcb77a46d7848114f
-
SHA1
5ceba8403897681c7be2b8969e610e5a17700771
-
SHA256
0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb
-
SHA512
d4ec2cb23d8f34eda5076914efe135121294af45473c44c032a54936df95c89e635475eef72ae67d5d382567f97c6088fed6d9067a2238fcfaa0e3799c1d0ae6
-
SSDEEP
1536:nnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxu:nGs8cd8eXlYairZYqMddH13u
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 720 omsecor.exe 2916 omsecor.exe 3520 omsecor.exe 1968 omsecor.exe 836 omsecor.exe 4468 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1596 set thread context of 2176 1596 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 82 PID 720 set thread context of 2916 720 omsecor.exe 87 PID 3520 set thread context of 1968 3520 omsecor.exe 100 PID 836 set thread context of 4468 836 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4068 1596 WerFault.exe 81 3960 720 WerFault.exe 85 2144 3520 WerFault.exe 99 4876 836 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2176 1596 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 82 PID 1596 wrote to memory of 2176 1596 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 82 PID 1596 wrote to memory of 2176 1596 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 82 PID 1596 wrote to memory of 2176 1596 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 82 PID 1596 wrote to memory of 2176 1596 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 82 PID 2176 wrote to memory of 720 2176 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 85 PID 2176 wrote to memory of 720 2176 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 85 PID 2176 wrote to memory of 720 2176 0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe 85 PID 720 wrote to memory of 2916 720 omsecor.exe 87 PID 720 wrote to memory of 2916 720 omsecor.exe 87 PID 720 wrote to memory of 2916 720 omsecor.exe 87 PID 720 wrote to memory of 2916 720 omsecor.exe 87 PID 720 wrote to memory of 2916 720 omsecor.exe 87 PID 2916 wrote to memory of 3520 2916 omsecor.exe 99 PID 2916 wrote to memory of 3520 2916 omsecor.exe 99 PID 2916 wrote to memory of 3520 2916 omsecor.exe 99 PID 3520 wrote to memory of 1968 3520 omsecor.exe 100 PID 3520 wrote to memory of 1968 3520 omsecor.exe 100 PID 3520 wrote to memory of 1968 3520 omsecor.exe 100 PID 3520 wrote to memory of 1968 3520 omsecor.exe 100 PID 3520 wrote to memory of 1968 3520 omsecor.exe 100 PID 1968 wrote to memory of 836 1968 omsecor.exe 102 PID 1968 wrote to memory of 836 1968 omsecor.exe 102 PID 1968 wrote to memory of 836 1968 omsecor.exe 102 PID 836 wrote to memory of 4468 836 omsecor.exe 104 PID 836 wrote to memory of 4468 836 omsecor.exe 104 PID 836 wrote to memory of 4468 836 omsecor.exe 104 PID 836 wrote to memory of 4468 836 omsecor.exe 104 PID 836 wrote to memory of 4468 836 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe"C:\Users\Admin\AppData\Local\Temp\0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exeC:\Users\Admin\AppData\Local\Temp\0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 2568⤵
- Program crash
PID:4876
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 2926⤵
- Program crash
PID:2144
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 2764⤵
- Program crash
PID:3960
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 2882⤵
- Program crash
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1596 -ip 15961⤵PID:4524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 720 -ip 7201⤵PID:1008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3520 -ip 35201⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 836 -ip 8361⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD50940a04319226d0436ca2116dded686f
SHA174cd54c88bf6fd3eb993785931e1e340b41e7847
SHA256696df67b336da41dca0ac044e2d3a51b9b45499c4fe1ee161287e209144b8554
SHA512df13cdf4572e3b32ef551f5cfec80e351ccfcaf2ee1e64a157e4b1d8d1d4b2d7b9d03525627c8917f770c8d04d4e2d680d196a026696e6f220765edf0314b4b6
-
Filesize
96KB
MD56d321317b860315c1a99cbab4c4a67ce
SHA1d537f1fd558ae34ecd2249ed6d59f00e2ec76a94
SHA25692ff0fbb65f70e7232ce7a611f63874094dd3cec2949f7c125f3673ea4fba711
SHA5124046d233fc2af4b5e07b6182129e54932e9bfa8699af353f1f5fd99d4a33d2ae77ead0d1cbe8afa841164478f92d25b43dadada6bd30857ce4f6d449e526e96f
-
Filesize
96KB
MD5641549c2f6337acb9832e871ef66fd53
SHA161099e708c531b90b79509719d11a8d14010e107
SHA25601ec1536f1131853e71e2ed565f43b602c511cf7b1f451ef89e4485e30eb81a8
SHA5128b57d049469aafec132cd8a1ded555f03ad1fd538cbd2fab44df63882b6809cfe4173f01032a20c2b2a0ea4fce6131b80a53f1b0048ef453d790c2ecfb3ad7d5