Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 02:35
Behavioral task
behavioral1
Sample
bd1155b711071f1be18a677d7a4105c63ed19929e3e11ad3ee093120cb4bc906.exe
Resource
win7-20240508-en
General
-
Target
bd1155b711071f1be18a677d7a4105c63ed19929e3e11ad3ee093120cb4bc906.exe
-
Size
92KB
-
MD5
a561faddd50a3f4b342fec48b6131610
-
SHA1
4e5e42bd6b4baa4b91f13fd449eaed4516e39420
-
SHA256
bd1155b711071f1be18a677d7a4105c63ed19929e3e11ad3ee093120cb4bc906
-
SHA512
489ef61d96098670375a94bac0abf766209315d45a277bee64339a546dc8fd12cf407fadc6cdfd23d63fa1dca25703df85b2a9a633b8e030dfc04fdba240c7df
-
SSDEEP
768:CMEIvFGvZEh8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:CbIvYvZEgFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1232 omsecor.exe 1480 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4504 wrote to memory of 1232 4504 bd1155b711071f1be18a677d7a4105c63ed19929e3e11ad3ee093120cb4bc906.exe 82 PID 4504 wrote to memory of 1232 4504 bd1155b711071f1be18a677d7a4105c63ed19929e3e11ad3ee093120cb4bc906.exe 82 PID 4504 wrote to memory of 1232 4504 bd1155b711071f1be18a677d7a4105c63ed19929e3e11ad3ee093120cb4bc906.exe 82 PID 1232 wrote to memory of 1480 1232 omsecor.exe 95 PID 1232 wrote to memory of 1480 1232 omsecor.exe 95 PID 1232 wrote to memory of 1480 1232 omsecor.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd1155b711071f1be18a677d7a4105c63ed19929e3e11ad3ee093120cb4bc906.exe"C:\Users\Admin\AppData\Local\Temp\bd1155b711071f1be18a677d7a4105c63ed19929e3e11ad3ee093120cb4bc906.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1480
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD572c30eb34929a48e7bb33c1e5c04c70f
SHA12bd989cc9f0b2f5eb95f5af3b72c67a36d3bb2bb
SHA2568f5fa24f8315ba65815157336aa96b68e8a4fe466008a3e2cd64404cdbf1057b
SHA5120ebe8925aec9544005f01f39974e21bfc1bd9c768eb1cc2264c3148429926c14e79ff1e7bf0c60132219550d7721af0a403fb42f12327f8e46ec5aeaa723578f
-
Filesize
92KB
MD58fdb6d6df67db6c4d02e79468b3df32e
SHA1189824084d5c1c91da1bea569fe94d86e4408485
SHA256a77a01e8237d9f76c1609aa55d3f36caa6291a3cf9ea84876183db83ffd23c2c
SHA512d78f6aa589e79d8be8bd26c523addc404abbe3fb216ede08a692e29037be78dfff13fafd74be1169730e903a7d8720399ef187c8fda868e13b5ec80d16044228