Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 18:31
Behavioral task
behavioral1
Sample
097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe
Resource
win7-20240221-en
General
-
Target
097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe
-
Size
72KB
-
MD5
73740b2d73331201c0cd16be06c8c0cf
-
SHA1
556100d8889f6ffe9346ff5b36a8076b9c19e423
-
SHA256
097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374
-
SHA512
96a7a2dada390c91b7124d1f693aab62a1247bd623af78a50890befee4cc787773aa4f3e4819336ed0662a862a677b47a3f3ea8ee37184f548ba80160f73ea64
-
SSDEEP
768:CMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAW:CbIvYvZEyFKF6N4yS+AQmZTl/5O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2100 omsecor.exe 2560 omsecor.exe 2540 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2896 097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe 2896 097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe 2100 omsecor.exe 2100 omsecor.exe 2560 omsecor.exe 2560 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2100 2896 097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe 28 PID 2896 wrote to memory of 2100 2896 097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe 28 PID 2896 wrote to memory of 2100 2896 097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe 28 PID 2896 wrote to memory of 2100 2896 097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe 28 PID 2100 wrote to memory of 2560 2100 omsecor.exe 32 PID 2100 wrote to memory of 2560 2100 omsecor.exe 32 PID 2100 wrote to memory of 2560 2100 omsecor.exe 32 PID 2100 wrote to memory of 2560 2100 omsecor.exe 32 PID 2560 wrote to memory of 2540 2560 omsecor.exe 33 PID 2560 wrote to memory of 2540 2560 omsecor.exe 33 PID 2560 wrote to memory of 2540 2560 omsecor.exe 33 PID 2560 wrote to memory of 2540 2560 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe"C:\Users\Admin\AppData\Local\Temp\097c79c852b7e404c9cfaa04a2fcd010c3a1769761f040ab0f6a6db1eed96374.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:2540
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5759e87a6927cb5a79fd504eaa8f0f540
SHA10fc5fd84f0690ac62af2831e2a8f7f909d500da3
SHA2566d6031da4a951bf1b08c7a88ce5a76f99480e183115be8a19c099576fa6ccb9f
SHA5128941f4960ba8085a2257f41af278a9d092a19189248adf50dffb536ed992505dc26321b2a3478b02ceeecc48d5911ee6f7ae59732422106368cd9e74dce3777d
-
Filesize
72KB
MD552d8b1d8d1ad9b09066062c91c9ca253
SHA174e0356c62c007b00e49583419a8b2b96006cda6
SHA2565992d58b4b8bb0164adcea43276278b5835985c28177643da0bf6bf49bf39f2e
SHA51273ceffd6745183507727ccadf28f806f9553452eb2c6f504ab799c3008c4f1f3557bd9741b39492591e0898a297d511b07e25a5b282c55f0e38dce24c879c586
-
Filesize
72KB
MD5d7c4a0ef5e89b9b7c9ec3821e65cc92d
SHA192857fc23f580cff5e9d4f7348eab151c067980d
SHA25607dab9d2d72ead0f0848ad2ef887847c1bcd88ab9112c12a2e59b0fa974a5da6
SHA51200176e52dd28c91d615f6bf5512d8d7789e5cb70481a7f2fafe42935af31bad2d89c98bfd415c0e475e6d967bbdb5a04b9844558d092a9e9bb97e3c167987f06