Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe
Resource
win7-20240419-en
General
-
Target
7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe
-
Size
96KB
-
MD5
8ea940fd1dd40ecdd53a3b8b35343c25
-
SHA1
487e78f505875dd49cd42d44d557722261a1176d
-
SHA256
7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a
-
SHA512
70c077ad17d0f63446edfac760c94142ddb3efbd9da144c1bb77b58585489df0e903784111d93fa5b470444de6a932503dc1acfae077d5c7605ffa39a93d4c26
-
SSDEEP
1536:cnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:cGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Detects executables built or packed with MPress PE compressor 10 IoCs
Processes:
resource yara_rule behavioral2/memory/852-0-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Roaming\omsecor.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/4364-9-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/852-19-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/4364-18-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Windows\SysWOW64\omsecor.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2864-32-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral2/memory/3060-45-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress C:\Users\Admin\AppData\Roaming\omsecor.exe INDICATOR_EXE_Packed_MPress behavioral2/memory/2864-52-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid process 4364 omsecor.exe 964 omsecor.exe 2864 omsecor.exe 956 omsecor.exe 3060 omsecor.exe 3512 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 852 set thread context of 2132 852 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe PID 4364 set thread context of 964 4364 omsecor.exe omsecor.exe PID 2864 set thread context of 956 2864 omsecor.exe omsecor.exe PID 3060 set thread context of 3512 3060 omsecor.exe omsecor.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4668 4364 WerFault.exe omsecor.exe 3028 852 WerFault.exe 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe 4700 2864 WerFault.exe omsecor.exe 4936 3060 WerFault.exe omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 852 wrote to memory of 2132 852 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe PID 852 wrote to memory of 2132 852 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe PID 852 wrote to memory of 2132 852 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe PID 852 wrote to memory of 2132 852 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe PID 852 wrote to memory of 2132 852 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe PID 2132 wrote to memory of 4364 2132 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe omsecor.exe PID 2132 wrote to memory of 4364 2132 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe omsecor.exe PID 2132 wrote to memory of 4364 2132 7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe omsecor.exe PID 4364 wrote to memory of 964 4364 omsecor.exe omsecor.exe PID 4364 wrote to memory of 964 4364 omsecor.exe omsecor.exe PID 4364 wrote to memory of 964 4364 omsecor.exe omsecor.exe PID 4364 wrote to memory of 964 4364 omsecor.exe omsecor.exe PID 4364 wrote to memory of 964 4364 omsecor.exe omsecor.exe PID 964 wrote to memory of 2864 964 omsecor.exe omsecor.exe PID 964 wrote to memory of 2864 964 omsecor.exe omsecor.exe PID 964 wrote to memory of 2864 964 omsecor.exe omsecor.exe PID 2864 wrote to memory of 956 2864 omsecor.exe omsecor.exe PID 2864 wrote to memory of 956 2864 omsecor.exe omsecor.exe PID 2864 wrote to memory of 956 2864 omsecor.exe omsecor.exe PID 2864 wrote to memory of 956 2864 omsecor.exe omsecor.exe PID 2864 wrote to memory of 956 2864 omsecor.exe omsecor.exe PID 956 wrote to memory of 3060 956 omsecor.exe omsecor.exe PID 956 wrote to memory of 3060 956 omsecor.exe omsecor.exe PID 956 wrote to memory of 3060 956 omsecor.exe omsecor.exe PID 3060 wrote to memory of 3512 3060 omsecor.exe omsecor.exe PID 3060 wrote to memory of 3512 3060 omsecor.exe omsecor.exe PID 3060 wrote to memory of 3512 3060 omsecor.exe omsecor.exe PID 3060 wrote to memory of 3512 3060 omsecor.exe omsecor.exe PID 3060 wrote to memory of 3512 3060 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe"C:\Users\Admin\AppData\Local\Temp\7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exeC:\Users\Admin\AppData\Local\Temp\7c1c369f13d684b5d0db3c1cbe91e3ab8193f5f4bc3d6d5ef1b147114bf1516a.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 2688⤵
- Program crash
PID:4936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2926⤵
- Program crash
PID:4700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 2884⤵
- Program crash
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 2882⤵
- Program crash
PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 852 -ip 8521⤵PID:996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4364 -ip 43641⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2864 -ip 28641⤵PID:3616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3060 -ip 30601⤵PID:1200
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53bb9c444c5e4e3b0c1a700e4a1eb85de
SHA1fedfa290358194f03b650aa5186eefee3422b9eb
SHA2564837eee11d66048351b0af6cd9b15820d7bb172f35a7df4fdec219be69a4ca90
SHA512a8c57ace27c781fe9e0b84ed27f48e2d226087f13f798f5bdc25ad16be023373a6036950e12a9e418dfaa389478744f507628d43ed63dc078625ccd2174075b0
-
Filesize
96KB
MD5342c1f27b63f3dd81606fe21901ebb65
SHA1e5438fc895f4c26b7fbd879f7442b19e3f6ed486
SHA256d78f06f365ab3ce20d8ad4c742fa2d16f8b4cfe82356277a3f291c0ec8edb380
SHA512590f1a0a7d3ce6b18c9329712bc8d7a1691cea326c898e043dc8520b29e2c98a2464df30e6c4c3d77218a40d6af57a2887d7ab18e1270e069aa8c435ad1a1d97
-
Filesize
96KB
MD5e1268c780e8e6bfaa2b333327814d898
SHA1fe8f2e7a200d2ebf4e952c841159eb885641aa20
SHA256a3d9414932dae1411388c8bb0aa56f00d0144dfe13ea4b2f7933dc421dd032f8
SHA512e3b51b50190f99f4d780b700ba386d6da3e9bb3fc170da2346d9f20250681a9dbe6381e6f48f9a2028a417c3afe42ba61f88a4d8b6c36c7c79720e86c79c4e29