Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 23:17
Behavioral task
behavioral1
Sample
4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2.exe
Resource
win7-20240221-en
General
-
Target
4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2.exe
-
Size
35KB
-
MD5
913c77c4166dbafdc682186be5afbde3
-
SHA1
64b1d5e0c77fa3dccd54b801315aea203777ad9e
-
SHA256
4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2
-
SHA512
b9d9e1720daac2f1401aa08436960d3ab0323a5fa4fca5dba0a8b90ec382c3e2045b444c2504a656f3bc7089a02954217778aee9a746064f4f0e310417b3227b
-
SSDEEP
768:L6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:28Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
UPX dump on OEP (original entry point) 15 IoCs
Processes:
resource yara_rule behavioral2/memory/4820-1-0x0000000000400000-0x000000000042D000-memory.dmp UPX C:\Users\Admin\AppData\Roaming\omsecor.exe UPX behavioral2/memory/4820-4-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral2/memory/4376-5-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral2/memory/4376-7-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral2/memory/4376-10-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral2/memory/4376-13-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral2/memory/4376-14-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral2/memory/4376-20-0x0000000000400000-0x000000000042D000-memory.dmp UPX C:\Windows\SysWOW64\omsecor.exe UPX behavioral2/memory/4032-22-0x0000000000400000-0x000000000042D000-memory.dmp UPX C:\Users\Admin\AppData\Roaming\omsecor.exe UPX behavioral2/memory/3832-26-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral2/memory/3832-28-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral2/memory/3832-31-0x0000000000400000-0x000000000042D000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 4376 omsecor.exe 4032 omsecor.exe 3832 omsecor.exe -
Processes:
resource yara_rule behavioral2/memory/4820-1-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral2/memory/4820-4-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4376-5-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4376-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4376-10-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4376-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4376-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4376-20-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Windows\SysWOW64\omsecor.exe upx behavioral2/memory/4032-22-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral2/memory/3832-26-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3832-28-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3832-31-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2.exeomsecor.exeomsecor.exedescription pid process target process PID 4820 wrote to memory of 4376 4820 4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2.exe omsecor.exe PID 4820 wrote to memory of 4376 4820 4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2.exe omsecor.exe PID 4820 wrote to memory of 4376 4820 4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2.exe omsecor.exe PID 4376 wrote to memory of 4032 4376 omsecor.exe omsecor.exe PID 4376 wrote to memory of 4032 4376 omsecor.exe omsecor.exe PID 4376 wrote to memory of 4032 4376 omsecor.exe omsecor.exe PID 4032 wrote to memory of 3832 4032 omsecor.exe omsecor.exe PID 4032 wrote to memory of 3832 4032 omsecor.exe omsecor.exe PID 4032 wrote to memory of 3832 4032 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2.exe"C:\Users\Admin\AppData\Local\Temp\4fb82184aebe8134de442d7936d69cb45ba5f9dcb6a8fbba2697733fe05950b2.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD5228e425210ac020563b2b1b6f28f5aed
SHA13f08728720c29a3ac8a0608bd56f3523eba431d2
SHA256ce34686b61de6932a1322196bb096ef08542782a7df8d647c1ff7fb767f3dedd
SHA51285cc8888f4969d9a9e616a95bfa32b922cd1b9c3326b94e90572e6b33ae0d222a652741bff7512b199661d4e6ed5b7eebb1eeab6b2875470dd761a8d18987064
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD5e2adea8aedc1637e781d0a59dec101be
SHA151d5a770910a50d6377fee7481a9c777d624364e
SHA256475b463606742af95a5dbbfdbae95057ea0143449593d64d7c3f8159945813cd
SHA512fd1e591719cb84972c022aa75a885a57bd356f08658ed4be9d7700e009598dade6dd672ceae7118e1c51d009fab0d3bc9dc2a7c7fbd00952533e3dd67b5f645c
-
C:\Windows\SysWOW64\omsecor.exeFilesize
35KB
MD5d35e92d956e0f50a75c6e934146bdef3
SHA1f747691742950e34de24b51da7fc74495846c8d7
SHA2568ff45b8b0a3389a4bd1b1ac571c526f6443f9d8eb1a6769966f2159ee6f2ac0f
SHA5127cb9044477d1e4d8ebe0fdae1a6f94ea7c39469f1d1b62f07660a68c7652b2b802b49e408a02505340ebf5047a1d33121976872b91ebc9d99b4c6ba107728f88
-
memory/3832-31-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3832-28-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3832-26-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4032-22-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4376-5-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4376-20-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4376-14-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4376-13-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4376-10-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4376-7-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4820-1-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4820-4-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB