Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 14:00
Behavioral task
behavioral1
Sample
fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe
Resource
win7-20240215-en
General
-
Target
fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe
-
Size
35KB
-
MD5
2938df17655406f6f7dd2e487c53c1c5
-
SHA1
50167caa0e9766991e2b87e43d820a730ba32c8a
-
SHA256
fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486
-
SHA512
34447e0c51d6ce191486173ccf8dfefe5d5bac4c29daaa050f915bc6df72f0d14a14a9cde0c17332ec0718048a72cc14c8a10f3c10049e723d8c90cfaef8a8d2
-
SSDEEP
768:76vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:m8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
UPX dump on OEP (original entry point) 16 IoCs
Processes:
resource yara_rule behavioral1/memory/2980-0-0x0000000000400000-0x000000000042D000-memory.dmp UPX \Users\Admin\AppData\Roaming\omsecor.exe UPX behavioral1/memory/2980-3-0x00000000005C0000-0x00000000005ED000-memory.dmp UPX behavioral1/memory/2980-10-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1716-12-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1716-14-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1716-20-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1716-23-0x0000000000400000-0x000000000042D000-memory.dmp UPX \Windows\SysWOW64\omsecor.exe UPX behavioral1/memory/1716-26-0x0000000000310000-0x000000000033D000-memory.dmp UPX behavioral1/memory/1768-37-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1716-34-0x0000000000400000-0x000000000042D000-memory.dmp UPX \Users\Admin\AppData\Roaming\omsecor.exe UPX behavioral1/memory/1768-43-0x0000000000220000-0x000000000024D000-memory.dmp UPX behavioral1/memory/1268-49-0x0000000000400000-0x000000000042D000-memory.dmp UPX behavioral1/memory/1268-52-0x0000000000400000-0x000000000042D000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 1716 omsecor.exe 1768 omsecor.exe 1268 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exeomsecor.exeomsecor.exepid process 2980 fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe 2980 fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe 1716 omsecor.exe 1716 omsecor.exe 1768 omsecor.exe 1768 omsecor.exe -
Processes:
resource yara_rule behavioral1/memory/2980-0-0x0000000000400000-0x000000000042D000-memory.dmp upx \Users\Admin\AppData\Roaming\omsecor.exe upx behavioral1/memory/2980-3-0x00000000005C0000-0x00000000005ED000-memory.dmp upx behavioral1/memory/2980-10-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1716-12-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1716-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1716-20-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1716-23-0x0000000000400000-0x000000000042D000-memory.dmp upx \Windows\SysWOW64\omsecor.exe upx behavioral1/memory/1716-26-0x0000000000310000-0x000000000033D000-memory.dmp upx behavioral1/memory/1768-37-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1716-34-0x0000000000400000-0x000000000042D000-memory.dmp upx \Users\Admin\AppData\Roaming\omsecor.exe upx behavioral1/memory/1768-43-0x0000000000220000-0x000000000024D000-memory.dmp upx behavioral1/memory/1268-49-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1268-52-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exeomsecor.exeomsecor.exedescription pid process target process PID 2980 wrote to memory of 1716 2980 fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe omsecor.exe PID 2980 wrote to memory of 1716 2980 fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe omsecor.exe PID 2980 wrote to memory of 1716 2980 fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe omsecor.exe PID 2980 wrote to memory of 1716 2980 fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe omsecor.exe PID 1716 wrote to memory of 1768 1716 omsecor.exe omsecor.exe PID 1716 wrote to memory of 1768 1716 omsecor.exe omsecor.exe PID 1716 wrote to memory of 1768 1716 omsecor.exe omsecor.exe PID 1716 wrote to memory of 1768 1716 omsecor.exe omsecor.exe PID 1768 wrote to memory of 1268 1768 omsecor.exe omsecor.exe PID 1768 wrote to memory of 1268 1768 omsecor.exe omsecor.exe PID 1768 wrote to memory of 1268 1768 omsecor.exe omsecor.exe PID 1768 wrote to memory of 1268 1768 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe"C:\Users\Admin\AppData\Local\Temp\fe2895a9f0aa42a65b03c9829a2dfb77d1d4bd5d5cd870533422052fbeebc486.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD5a17bf18357316df314199e2e33b196ea
SHA12ae3769c1ac36b87ce8ae5c849666697d670185b
SHA25618c9a3812e5b8ed7427e7900c73120d25bf614c391b1e2b657723740e768bd0b
SHA512a0eb415ef6f3022ebb4c44f084c843571ff16bfca7c9b79d14259cab1a0119d004997f41d370da5dcce0be534843d2cbb07a58a3f9ad267ee1fa41046c6f38ec
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD5f872c8966d1f5920ef50e2a24863591d
SHA10da78760d705676d606f3f8f269c3c40ecaa935c
SHA25670bd26c73f5feaf4f72f80300701ed1c3a6cdd6d200dd550b3b16ed166eb76b2
SHA5122fab512d57b8957443cdcb22997b377063926e373f8a7970b7c3e43098086d6d74edc4b6458411e276176427a55dc9a371a7e5e39e2e7bc173e8bc4f43236039
-
\Windows\SysWOW64\omsecor.exeFilesize
35KB
MD5c0eadf00e84a73691c7f6a0ae9526e60
SHA18840b5a1e1be568ed9a9c928fb69328782ad2640
SHA2565610df1c0f1d5fcd13539e3097ea7e2456d4795dc394623284df0a8748471979
SHA5120277837e7a6f9a2edb4d0d759321d0ea5673f5f46caa1ce6c76cd62429ba655013cdd60ff378d3954ce412d0ea655c47759531eab3325c4bc5290033dcb0de11
-
memory/1268-49-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1268-52-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1716-26-0x0000000000310000-0x000000000033D000-memory.dmpFilesize
180KB
-
memory/1716-20-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1716-23-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1716-34-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1716-14-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1716-12-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1768-37-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1768-46-0x0000000000220000-0x000000000024D000-memory.dmpFilesize
180KB
-
memory/1768-43-0x0000000000220000-0x000000000024D000-memory.dmpFilesize
180KB
-
memory/2980-0-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2980-10-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2980-3-0x00000000005C0000-0x00000000005ED000-memory.dmpFilesize
180KB