Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:55
Behavioral task
behavioral1
Sample
51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe
Resource
win7-20240215-en
General
-
Target
51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe
-
Size
72KB
-
MD5
213f1b0494eab73df3f4b3f74aa097a0
-
SHA1
a7623ecc1e9096fb042e1f1ca10f16fd7f8d72bd
-
SHA256
51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a
-
SHA512
ab150280068ad49fa94ce959ecf97f8165f2590a2a40209ff0ab693c70155e096524857f638acaf5b32ef5ede919560a931533f85f0da78baafad72f648a3f1a
-
SSDEEP
768:NMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAW:NbIvYvZEyFKF6N4yS+AQmZTl/5O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 2384 omsecor.exe 2952 omsecor.exe 1060 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exeomsecor.exeomsecor.exepid process 2392 51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe 2392 51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe 2384 omsecor.exe 2384 omsecor.exe 2952 omsecor.exe 2952 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exeomsecor.exeomsecor.exedescription pid process target process PID 2392 wrote to memory of 2384 2392 51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe omsecor.exe PID 2392 wrote to memory of 2384 2392 51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe omsecor.exe PID 2392 wrote to memory of 2384 2392 51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe omsecor.exe PID 2392 wrote to memory of 2384 2392 51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe omsecor.exe PID 2384 wrote to memory of 2952 2384 omsecor.exe omsecor.exe PID 2384 wrote to memory of 2952 2384 omsecor.exe omsecor.exe PID 2384 wrote to memory of 2952 2384 omsecor.exe omsecor.exe PID 2384 wrote to memory of 2952 2384 omsecor.exe omsecor.exe PID 2952 wrote to memory of 1060 2952 omsecor.exe omsecor.exe PID 2952 wrote to memory of 1060 2952 omsecor.exe omsecor.exe PID 2952 wrote to memory of 1060 2952 omsecor.exe omsecor.exe PID 2952 wrote to memory of 1060 2952 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe"C:\Users\Admin\AppData\Local\Temp\51eae04e5b7984ec441c4547b585b69ea300ca2867be45aad2fe9048f6f77b1a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:1060
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5b98f43dc26217fc6f66ec652cab2c6a6
SHA159279789591f4f8c2009625d0bd508c014fac134
SHA2565254ff6bc0a231e0ebbbf3a89f529aac5d9e76bcfa4bc690646859def26918e2
SHA5123a1246f92cad9025aeca42c8368caa8030de95d572a355f9d350a8c6b6217ced367722fb8007acafbbda373aad5f112cd0169b4414c30c35a7b1ea1bc5ec89e2
-
Filesize
72KB
MD59dbe632100ac9c08c77cd3f86df58db1
SHA18645ca0750c1c44dc52228c2f6055a11079169d7
SHA2564519ff8061372cb0b16eb75153991b4036a97516bb75400f8b80addef05304c2
SHA512d899999c10702ac4950e1494c95ff8caf151de1b5d24574451be55ce44e66cd23c0f33eea494b5d99cbdc3c2e3691cd1b6d6e074dcd9ea4963c7f6d540d5c55d
-
Filesize
72KB
MD527a54b87a5cac390f7b6f47c4d386f32
SHA15cfaf144a9ff6f16b91eebcd5dd28b47310701f6
SHA25663d99b9ee2142dd3f02f4cf51500ef706d7f69cd807bf37c36e2fcd76a06e18d
SHA5129e2eb4984e3826ed072fd800420b21ebc7b99bbd1a27cd6a19a4e0ab3da5159f9a51f43f38fec522af7f79095e03d52b8fd3d5d5a6278f9ec63b9a427a332e1f