Overview
overview
7Static
static
7OmegaX.zip
windows7-x64
1OmegaX.zip
windows10-2004-x64
1OmegaX/Bin/Lua.xml
windows7-x64
1OmegaX/Bin/Lua.xml
windows10-2004-x64
1OmegaX/ICS...it.dll
windows7-x64
1OmegaX/ICS...it.dll
windows10-2004-x64
1OmegaX/Ome...de.dll
windows7-x64
1OmegaX/Ome...de.dll
windows10-2004-x64
3OmegaX/OmegaX.exe
windows7-x64
7OmegaX/OmegaX.exe
windows10-2004-x64
7Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
OmegaX.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
OmegaX.zip
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
OmegaX/Bin/Lua.xml
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
OmegaX/Bin/Lua.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
OmegaX/ICSharpCode.AvalonEdit.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
OmegaX/ICSharpCode.AvalonEdit.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
OmegaX/OmegaBytecode.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
OmegaX/OmegaBytecode.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
OmegaX/OmegaX.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
OmegaX/OmegaX.exe
Resource
win10v2004-20240412-en
General
-
Target
OmegaX/OmegaX.exe
-
Size
868KB
-
MD5
2afd4f91c0ccce5ae9fb4140c1c73c74
-
SHA1
c824626dc66b67cc8fbf4e706bd896b380c19dac
-
SHA256
82ffca06810c9367b072ef3a03828c9ac7024e23d7ddda7257905135a51c1ae2
-
SHA512
ade1023938b7fd1d2ff088c7bf26cd359e4a42e2f50cce46890136b7a34f9af8695a06082cd4dd21a9c385adba16d563a5f14a1bc3360ee12d17c3732c3bfa85
-
SSDEEP
24576:ZXuRMH2rcqivkRYgQ/jGdfFW4pOa1DRnA1X0:5uu2rcqWkOgOGd7pO0A1X0
Malware Config
Signatures
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral9/memory/2956-0-0x0000000001050000-0x0000000001130000-memory.dmp net_reactor -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 4 pastebin.com -
Program crash 1 IoCs
pid pid_target Process procid_target 2468 2956 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2956 OmegaX.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2468 2956 OmegaX.exe 28 PID 2956 wrote to memory of 2468 2956 OmegaX.exe 28 PID 2956 wrote to memory of 2468 2956 OmegaX.exe 28 PID 2956 wrote to memory of 2468 2956 OmegaX.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\OmegaX\OmegaX.exe"C:\Users\Admin\AppData\Local\Temp\OmegaX\OmegaX.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 16762⤵
- Program crash
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a