Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 04:14
Behavioral task
behavioral1
Sample
e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe
Resource
win7-20240215-en
General
-
Target
e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe
-
Size
84KB
-
MD5
27b3f3d330c1676819c043ccfcbeac42
-
SHA1
fa115d0f9ac440a69245c02259affafb40e605d3
-
SHA256
e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e
-
SHA512
71fffe1679166438901b4dc6927a217255c9d8033f18741b4edf2d6556daed8427bef17f2010d3bb271f424e2719cdeab01f3c5abe6a0ab2cf118bd756119fa2
-
SSDEEP
1536:Dd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:jdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3020 omsecor.exe 2304 omsecor.exe 320 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2240 e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe 2240 e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe 3020 omsecor.exe 3020 omsecor.exe 2304 omsecor.exe 2304 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2240 wrote to memory of 3020 2240 e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe 28 PID 2240 wrote to memory of 3020 2240 e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe 28 PID 2240 wrote to memory of 3020 2240 e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe 28 PID 2240 wrote to memory of 3020 2240 e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe 28 PID 3020 wrote to memory of 2304 3020 omsecor.exe 32 PID 3020 wrote to memory of 2304 3020 omsecor.exe 32 PID 3020 wrote to memory of 2304 3020 omsecor.exe 32 PID 3020 wrote to memory of 2304 3020 omsecor.exe 32 PID 2304 wrote to memory of 320 2304 omsecor.exe 33 PID 2304 wrote to memory of 320 2304 omsecor.exe 33 PID 2304 wrote to memory of 320 2304 omsecor.exe 33 PID 2304 wrote to memory of 320 2304 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe"C:\Users\Admin\AppData\Local\Temp\e3292a72e6e5471304f53e2a0525fa776e27b1624e862f98103b24cf4a45f36e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:320
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD50660c7bfed30be7c43c327585ccc356b
SHA1e9bfdc9bc51e5f3e54e2028d2d7ff258f8a8d1cc
SHA25618f010f6eafed90afb0eeb5bc3514aa1c3bc021e0bfbe94a094d8157ec0f3022
SHA5121f72161396fb482e7afaf7a9776ebf8e9f84a42c9e79835e18541580fb503989492d3fca472d70656736ee13ddbb11a84d235f90f818783cbb2430ce6cf4f4b3
-
Filesize
84KB
MD5bd589bac32e49f2e91aabdbe9f6cc7b8
SHA141d3b1144e96a41fd3317cd66d8a1233c040e7da
SHA256ffca99c3b9f2a6d66d2e0259cc59e2c14c3e6947e93ed7bc48c0babdff20df5f
SHA51278db8425f6f549398e67a12631715b324dd3fe111e205f84a51ebd6e0565295be3a4c08a945d893811d411405d437f96244131b11342f0ae4824782f4509ecb7
-
Filesize
84KB
MD55b9fd25c663cc99023e1ff7db8ce994c
SHA1d663df13284a9ab8ab39910bf9501c5009fb0707
SHA256ff346085ba7a07f5a7135ceaee11245b8a93a598e66e5e86c52a9d8c0e684c5f
SHA51268403eaef1e99b7aa9b07b147ad466329cf7aabe0f4af732c07dcb330460593bd0aec96d8ac88fb0d3f38dc3ba932a7738b039d53e9ae6c3a658fab93370a6ed