Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:26
Behavioral task
behavioral1
Sample
4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe
Resource
win7-20231129-en
General
-
Target
4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe
-
Size
72KB
-
MD5
95a26f3e11920251fa16e592a98034b2
-
SHA1
82b03f8caa440cf16e7b8274b59449fc3d0532b1
-
SHA256
4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246
-
SHA512
155380aae93d0d9a1e7999aba28927bddd136fa366d45e3b92f3a666b85b5a31b7294328e77a4217cd456ef7ed93e4a9c5b288adb3bd638a5b774afe556ecca3
-
SSDEEP
1536:od9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211:YdseIOMEZEyFjEOFqTiQm5l/5211
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 1920 omsecor.exe 2744 omsecor.exe 1472 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exeomsecor.exeomsecor.exepid process 1908 4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe 1908 4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe 1920 omsecor.exe 1920 omsecor.exe 2744 omsecor.exe 2744 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exeomsecor.exeomsecor.exedescription pid process target process PID 1908 wrote to memory of 1920 1908 4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe omsecor.exe PID 1908 wrote to memory of 1920 1908 4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe omsecor.exe PID 1908 wrote to memory of 1920 1908 4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe omsecor.exe PID 1908 wrote to memory of 1920 1908 4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe omsecor.exe PID 1920 wrote to memory of 2744 1920 omsecor.exe omsecor.exe PID 1920 wrote to memory of 2744 1920 omsecor.exe omsecor.exe PID 1920 wrote to memory of 2744 1920 omsecor.exe omsecor.exe PID 1920 wrote to memory of 2744 1920 omsecor.exe omsecor.exe PID 2744 wrote to memory of 1472 2744 omsecor.exe omsecor.exe PID 2744 wrote to memory of 1472 2744 omsecor.exe omsecor.exe PID 2744 wrote to memory of 1472 2744 omsecor.exe omsecor.exe PID 2744 wrote to memory of 1472 2744 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe"C:\Users\Admin\AppData\Local\Temp\4cc3308f342c60d2d0f39c40d8c44ec19cd15d1f07f06e279ff24e7b71078246.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:1472
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5a6b7e5317adbf83ff7f1b88f3d1d84c7
SHA134c3715e44b025ea9fd664f7ba143733bce3567b
SHA2563d28316449842df8890b08eb56896b497c34e03acfa5c6ebb54bcbb365676ac2
SHA5128efa65b6eaee72cc24cf449a097f1c94ed77f318f6c54db5f3c8a35c22082ec3e8728f8dd257d86aad65ffb91656945438b08bd1ea755f8cb2ba4dbc765ee8b9
-
Filesize
72KB
MD54d694295edad130bc62a774b26c88179
SHA124a0f7e859faacb7a6ad9c10b4543aba8d27af39
SHA2566b1a19367d2b69835c238ace80523917dc2625cb450153ef7dddf1bde93062e8
SHA5120c19c945291179151d7c645297da9a5b09ed6365443a91f56165ececf1640474e48f462b22179b49634155d60dc947b15b4da6d687ade0aac9992f1b52019bb5
-
Filesize
72KB
MD56564ff4482858cce97a8e2208961153d
SHA129135529e1a5820216cfc53823510a4a722a3bbe
SHA256bed52e505c5fecb36bf27e8a8b2c329d4e79ed545e1be66982691fb9fc5f3e08
SHA51238bd74a54fbab6a3c4ea2e14421e38e18a3eb6bde1bf141582da2e1f558cac290064b9778232f7c6d3e1ea916076039f8aa47b526a902850ff23b7ee22a7c19d