Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe
Resource
win7-20240221-en
General
-
Target
69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe
-
Size
96KB
-
MD5
a5695f66f5e56ec8ceb2d4104b5c169d
-
SHA1
213fe3490e05f89cd98d64e1366f35e1b6ecdc82
-
SHA256
69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f
-
SHA512
ccc5b57917d6c05c9644ccef2a04fb940b015223e979b10312a8b4fa71f5b7e77896242231e6149f55bfc66ec282d6f34460d06fd51629bbb2d4d23364d3ccd1
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:hGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Detects executables built or packed with MPress PE compressor 13 IoCs
resource yara_rule behavioral1/memory/2136-0-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2136-7-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000b000000015bb9-14.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2332-21-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2332-31-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x0005000000004ed7-45.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2584-46-0x00000000002D0000-0x00000000002F3000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1268-56-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1268-64-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/files/0x000b000000015bb9-69.dat INDICATOR_EXE_Packed_MPress behavioral1/memory/2892-70-0x0000000000260000-0x0000000000283000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2992-79-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2992-86-0x0000000000400000-0x0000000000423000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 6 IoCs
pid Process 2332 omsecor.exe 2584 omsecor.exe 1268 omsecor.exe 2892 omsecor.exe 2992 omsecor.exe 2940 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2472 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 2472 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 2332 omsecor.exe 2584 omsecor.exe 2584 omsecor.exe 2892 omsecor.exe 2892 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2136 set thread context of 2472 2136 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 28 PID 2332 set thread context of 2584 2332 omsecor.exe 30 PID 1268 set thread context of 2892 1268 omsecor.exe 35 PID 2992 set thread context of 2940 2992 omsecor.exe 37 -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2472 2136 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 28 PID 2136 wrote to memory of 2472 2136 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 28 PID 2136 wrote to memory of 2472 2136 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 28 PID 2136 wrote to memory of 2472 2136 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 28 PID 2136 wrote to memory of 2472 2136 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 28 PID 2136 wrote to memory of 2472 2136 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 28 PID 2472 wrote to memory of 2332 2472 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 29 PID 2472 wrote to memory of 2332 2472 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 29 PID 2472 wrote to memory of 2332 2472 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 29 PID 2472 wrote to memory of 2332 2472 69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe 29 PID 2332 wrote to memory of 2584 2332 omsecor.exe 30 PID 2332 wrote to memory of 2584 2332 omsecor.exe 30 PID 2332 wrote to memory of 2584 2332 omsecor.exe 30 PID 2332 wrote to memory of 2584 2332 omsecor.exe 30 PID 2332 wrote to memory of 2584 2332 omsecor.exe 30 PID 2332 wrote to memory of 2584 2332 omsecor.exe 30 PID 2584 wrote to memory of 1268 2584 omsecor.exe 34 PID 2584 wrote to memory of 1268 2584 omsecor.exe 34 PID 2584 wrote to memory of 1268 2584 omsecor.exe 34 PID 2584 wrote to memory of 1268 2584 omsecor.exe 34 PID 1268 wrote to memory of 2892 1268 omsecor.exe 35 PID 1268 wrote to memory of 2892 1268 omsecor.exe 35 PID 1268 wrote to memory of 2892 1268 omsecor.exe 35 PID 1268 wrote to memory of 2892 1268 omsecor.exe 35 PID 1268 wrote to memory of 2892 1268 omsecor.exe 35 PID 1268 wrote to memory of 2892 1268 omsecor.exe 35 PID 2892 wrote to memory of 2992 2892 omsecor.exe 36 PID 2892 wrote to memory of 2992 2892 omsecor.exe 36 PID 2892 wrote to memory of 2992 2892 omsecor.exe 36 PID 2892 wrote to memory of 2992 2892 omsecor.exe 36 PID 2992 wrote to memory of 2940 2992 omsecor.exe 37 PID 2992 wrote to memory of 2940 2992 omsecor.exe 37 PID 2992 wrote to memory of 2940 2992 omsecor.exe 37 PID 2992 wrote to memory of 2940 2992 omsecor.exe 37 PID 2992 wrote to memory of 2940 2992 omsecor.exe 37 PID 2992 wrote to memory of 2940 2992 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe"C:\Users\Admin\AppData\Local\Temp\69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exeC:\Users\Admin\AppData\Local\Temp\69c50512add578cf1523cc690877c35e61dafe105472320d5c619d594930371f.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
PID:2940
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD57ce1fbded925b97dcc2dcd13e8c9213e
SHA1dc6d70140e985d7d5fc7a45b5f8524eb508ad187
SHA2560fd930f8e9962e4a335b5d24d2ab770d66c2b213323db57a3236df646ee49e30
SHA512f33f4eaa4960c22742ef18856a007394942bd3c26e9d84161781885e868f9f403a8f293447bff901a6b09ec38834c907d027f25c5ebeea14c63e9047843f1c50
-
Filesize
96KB
MD549f3db7a269356f83390f9fecc98564c
SHA1714065689d694dbfc4014df0a46fed7a740278ee
SHA2563055f5b962a924abd3517adb737200b93cf4eaf72551cee4092786719cad19dd
SHA512446b248906a4165a8c84ed1bfee9e5f28be3bc108334f821031e7dfc12ff7bc2e07d2040f0f6a6da36da8605a0b5bf2bf97a98a046cbbf3d5238282183553790
-
Filesize
96KB
MD5c0b3fbac75f9546e88e68e6eb1152ecc
SHA192f06972f463b26259efbb6e262095bf95bd11a2
SHA2565fbb52818371f0a332e78a1f2b2cda60f7ef52b7dda8ef8b923714cf0849fe7b
SHA512ddf4dace77d4c0e14152af65195f76867177a3dc8e50dca5e3cab37ea4c4908c451bb20fd07134060d759f07997bb803f8ea1c292d6741068b879a2d8f7ad147