Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 03:29
Behavioral task
behavioral1
Sample
83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350.exe
Resource
win7-20240508-en
General
-
Target
83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350.exe
-
Size
68KB
-
MD5
a89d8977cea49ccc1197d743e5ab32f8
-
SHA1
c8d9831310c9b9a3e06f1cdd31d67aef04cc1cc1
-
SHA256
83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350
-
SHA512
84ddecec3fe48ec26ab3bf19391b2519282682ec54cb5c4525a044e729474837bb5581c94c72548970d626d6cbfc690addde8c90e32c9318a863adaa2be39dba
-
SSDEEP
1536:Jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:JdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 4440 omsecor.exe 1260 omsecor.exe 4848 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350.exeomsecor.exeomsecor.exedescription pid process target process PID 6120 wrote to memory of 4440 6120 83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350.exe omsecor.exe PID 6120 wrote to memory of 4440 6120 83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350.exe omsecor.exe PID 6120 wrote to memory of 4440 6120 83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350.exe omsecor.exe PID 4440 wrote to memory of 1260 4440 omsecor.exe omsecor.exe PID 4440 wrote to memory of 1260 4440 omsecor.exe omsecor.exe PID 4440 wrote to memory of 1260 4440 omsecor.exe omsecor.exe PID 1260 wrote to memory of 4848 1260 omsecor.exe omsecor.exe PID 1260 wrote to memory of 4848 1260 omsecor.exe omsecor.exe PID 1260 wrote to memory of 4848 1260 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350.exe"C:\Users\Admin\AppData\Local\Temp\83cd2b57e98a4ccc0ef141002fe1e3b7a7e40c28122aa3ce8ce01082ebafd350.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
68KB
MD52b9bb124c3ae5fc9990b29dcb599f92b
SHA1e2f66022d3dd3df8a25925e960665c5d5412c836
SHA256a2f4d2421baf7ecbdb402169e6d8188c1807806f77b97fc100d48ff537457f1f
SHA512881c2eea40312a0df9f11bbe6de80ee2e0348c58c369a0b13e50c1fa11c56611877756c1a78904cbfcad9c30af75c0dc07250cf8c227f951e822ccd58022ef0e
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
68KB
MD58ff81ed280ffaca6e07676e54e21fedb
SHA1d16628659f90934423088997ddc300cede79e628
SHA256bceaa6b96c8aa2f9c2125c96f2f2e473d2381ce62331f8b8a28bc42d4860d477
SHA5125c43dc8ff889be5c2424058a33d966a9f39a5871397107c509677a0ae5d44f78ef338cb4989458d836793a5e8683e51d6ebf0536a1c2d7f2a4f93b01aa3ce547
-
C:\Windows\SysWOW64\omsecor.exeFilesize
68KB
MD5ac8fb7fcc4a962783f22c064b0cdb3bc
SHA1f90da7235d5fea6bfd66449562fdf6d1aa4388f3
SHA256dbda87d4bfca13996db5f87b1dcbdfee55d2595ad9503d2e6aae2f163aa089a6
SHA512363d85265c6f062acb365cc540ef09edf6c058e615c658b9a1230418cb7240580240b847a7e9be267e214703c6d4296af7b98b73d3f35559888acc4c7cd4cc2b