Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 04:52
Behavioral task
behavioral1
Sample
290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe
Resource
win7-20231129-en
General
-
Target
290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe
-
Size
64KB
-
MD5
ed238f3d3a197b90e594c4b3a595f5c0
-
SHA1
24a229dc0336f8f2a0315b00c4134e5ae7d23fac
-
SHA256
290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1
-
SHA512
e97cbc696a09ae4bd6f2505647970ecd7c18a366ae2bf9fcfd6e02e38d4f6973d2742541427a33bb67a2860a887a36ad0cc1342aa559f0f6ada66c2422fdc13e
-
SSDEEP
768:eMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uA:ebIvYvZEyFKF6N4yS+AQmZcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 2880 omsecor.exe 2380 omsecor.exe 1832 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exeomsecor.exeomsecor.exepid process 2320 290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe 2320 290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe 2880 omsecor.exe 2880 omsecor.exe 2380 omsecor.exe 2380 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exeomsecor.exeomsecor.exedescription pid process target process PID 2320 wrote to memory of 2880 2320 290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe omsecor.exe PID 2320 wrote to memory of 2880 2320 290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe omsecor.exe PID 2320 wrote to memory of 2880 2320 290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe omsecor.exe PID 2320 wrote to memory of 2880 2320 290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe omsecor.exe PID 2880 wrote to memory of 2380 2880 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2380 2880 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2380 2880 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2380 2880 omsecor.exe omsecor.exe PID 2380 wrote to memory of 1832 2380 omsecor.exe omsecor.exe PID 2380 wrote to memory of 1832 2380 omsecor.exe omsecor.exe PID 2380 wrote to memory of 1832 2380 omsecor.exe omsecor.exe PID 2380 wrote to memory of 1832 2380 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe"C:\Users\Admin\AppData\Local\Temp\290714ed433f7e77c1d985f1232580a8928b149900450ca7a2831e092ea43dd1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
64KB
MD5af7ad0425288fa34145b49be1ade7b92
SHA16bf1d3682f61d4a9ea4a04e988bb9ca399fa3f00
SHA2562fbea802ab420d4a5145fe20662a025e057987d8343fe5772bb618b8a1f91b3e
SHA512b3d904071cfa426e32935a33204695f82b5a57c5916d37d0e0e5124514af7968b78d1cb63c21de1752d5f4773936a8c8f46bd2b7a02866029dd6079b95e7a2cd
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
64KB
MD5d7550bbbf87c0a2b62ea71b8121412d2
SHA109b1999812e5df3c5f61453924d39089d553bd24
SHA25620431ee18dde0ce45a445f734f0cff53f218f4bbc4f4317f066327bd35fa7aa4
SHA512a65f5716059e07562bd6f46a3f540f888dfebdfb63b2aa4496491747509b04c901a1bf57d92cb65c9125fba89f3dfb6ed9074c8bdd0f36500da1bf7dc85d7bf4
-
\Windows\SysWOW64\omsecor.exeFilesize
64KB
MD5cad5647ead1197c8e60460e67505397d
SHA155f7125c02843509bc325845536a6105b3628029
SHA2568f38d98c8da4f7447eb3bc72100f3ec57b7e5e18462ad7cde83dff775b8fe48e
SHA51224e856ee5ba70bfa818318ba05c5982b11b1c619da52cdba2411692bf58652818354fa209f8723015343d0eea6b19d96d5f995c2dd71d17eae29ff42dbf7175d