Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19-06-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe
Resource
win7-20231129-en
General
-
Target
363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe
-
Size
134KB
-
MD5
4b9ebb020ec10103e5f0781604e4a3c8
-
SHA1
dd1466d8ca8c1e25851980a47598ea33a2745e6e
-
SHA256
363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796
-
SHA512
a94f701e5d0721a2feda003c7df09c82e4bef6ead2268f27cfab73b4687a60632f7f0d228830d68b5a463921c521665a0094d737398a7755e62f9171bb2439f8
-
SSDEEP
1536:0DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:KiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Detects executables built or packed with MPress PE compressor 12 IoCs
Processes:
resource yara_rule behavioral1/memory/2884-0-0x0000000000400000-0x0000000000424000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2884-7-0x0000000000400000-0x0000000000424000-memory.dmp INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Roaming\omsecor.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/3008-20-0x0000000000400000-0x0000000000424000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/3008-29-0x0000000000400000-0x0000000000424000-memory.dmp INDICATOR_EXE_Packed_MPress \Windows\SysWOW64\omsecor.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/2996-45-0x0000000001F50000-0x0000000001F74000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2660-55-0x0000000000400000-0x0000000000424000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/2660-63-0x0000000000400000-0x0000000000424000-memory.dmp INDICATOR_EXE_Packed_MPress \Users\Admin\AppData\Roaming\omsecor.exe INDICATOR_EXE_Packed_MPress behavioral1/memory/1308-76-0x0000000000400000-0x0000000000424000-memory.dmp INDICATOR_EXE_Packed_MPress behavioral1/memory/1308-83-0x0000000000400000-0x0000000000424000-memory.dmp INDICATOR_EXE_Packed_MPress -
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid process 3008 omsecor.exe 2996 omsecor.exe 2660 omsecor.exe 1600 omsecor.exe 1308 omsecor.exe 2300 omsecor.exe -
Loads dropped DLL 7 IoCs
Processes:
363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exeomsecor.exeomsecor.exeomsecor.exepid process 2960 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 2960 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 3008 omsecor.exe 2996 omsecor.exe 2996 omsecor.exe 1600 omsecor.exe 1600 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 2884 set thread context of 2960 2884 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe PID 3008 set thread context of 2996 3008 omsecor.exe omsecor.exe PID 2660 set thread context of 1600 2660 omsecor.exe omsecor.exe PID 1308 set thread context of 2300 1308 omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 2884 wrote to memory of 2960 2884 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe PID 2884 wrote to memory of 2960 2884 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe PID 2884 wrote to memory of 2960 2884 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe PID 2884 wrote to memory of 2960 2884 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe PID 2884 wrote to memory of 2960 2884 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe PID 2884 wrote to memory of 2960 2884 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe PID 2960 wrote to memory of 3008 2960 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe omsecor.exe PID 2960 wrote to memory of 3008 2960 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe omsecor.exe PID 2960 wrote to memory of 3008 2960 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe omsecor.exe PID 2960 wrote to memory of 3008 2960 363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe omsecor.exe PID 3008 wrote to memory of 2996 3008 omsecor.exe omsecor.exe PID 3008 wrote to memory of 2996 3008 omsecor.exe omsecor.exe PID 3008 wrote to memory of 2996 3008 omsecor.exe omsecor.exe PID 3008 wrote to memory of 2996 3008 omsecor.exe omsecor.exe PID 3008 wrote to memory of 2996 3008 omsecor.exe omsecor.exe PID 3008 wrote to memory of 2996 3008 omsecor.exe omsecor.exe PID 2996 wrote to memory of 2660 2996 omsecor.exe omsecor.exe PID 2996 wrote to memory of 2660 2996 omsecor.exe omsecor.exe PID 2996 wrote to memory of 2660 2996 omsecor.exe omsecor.exe PID 2996 wrote to memory of 2660 2996 omsecor.exe omsecor.exe PID 2660 wrote to memory of 1600 2660 omsecor.exe omsecor.exe PID 2660 wrote to memory of 1600 2660 omsecor.exe omsecor.exe PID 2660 wrote to memory of 1600 2660 omsecor.exe omsecor.exe PID 2660 wrote to memory of 1600 2660 omsecor.exe omsecor.exe PID 2660 wrote to memory of 1600 2660 omsecor.exe omsecor.exe PID 2660 wrote to memory of 1600 2660 omsecor.exe omsecor.exe PID 1600 wrote to memory of 1308 1600 omsecor.exe omsecor.exe PID 1600 wrote to memory of 1308 1600 omsecor.exe omsecor.exe PID 1600 wrote to memory of 1308 1600 omsecor.exe omsecor.exe PID 1600 wrote to memory of 1308 1600 omsecor.exe omsecor.exe PID 1308 wrote to memory of 2300 1308 omsecor.exe omsecor.exe PID 1308 wrote to memory of 2300 1308 omsecor.exe omsecor.exe PID 1308 wrote to memory of 2300 1308 omsecor.exe omsecor.exe PID 1308 wrote to memory of 2300 1308 omsecor.exe omsecor.exe PID 1308 wrote to memory of 2300 1308 omsecor.exe omsecor.exe PID 1308 wrote to memory of 2300 1308 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe"C:\Users\Admin\AppData\Local\Temp\363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exeC:\Users\Admin\AppData\Local\Temp\363701b7eaccb48c959bc291cbe481c563dbfdcf0570bfa1e17489474f5ab796.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
134KB
MD56edf1945c3296c6f87680e8bb518f7f5
SHA17f7414a27b3a2774a90219f9c3dd40d13fffb0db
SHA256e36bddcb580a9183a39b202060b32f699aa4a7c30149716c7e7b9f73da2013bc
SHA512df41dd39b797ffc8cae4fbe8c82533199cc8b30dc969a8b9e751a630c9d35691db27f8e10e02bc04db9deb204124cab24efccb1c1663506273d6d386c5789770
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
134KB
MD5797b7b1fb417f7c0aaa894ef2a8a17e0
SHA133e26be7beddf15d0a745c13a7f03ebd5a2ac437
SHA25619949127139a6f786cc601b578b6f9994f142e0e0bc050d71064473be17efc0f
SHA512b01a5b42d63583689a7e4d3de219598b92ef7a66b2103d4caa45e3891eaa465f4affeee22df2411be1a2e9ba4539cdf02b7915732e8ed254e83545136228176b
-
\Windows\SysWOW64\omsecor.exeFilesize
134KB
MD5f279d2dca58828722dccc662d0ec798f
SHA14604816d0de17e90d6e54be7f8c6274baf668606
SHA2562200907c6a0824cea6c3e298cd5eaff87c59a262da8dee5d9d34c6075e758580
SHA5127d66ecf215aeaa84b11cf90b2b95eb2f6175cddad1b2ef62b99301cf3cecc1bf6e9ff2b174f45a70b73c650a46b7393f66cf2ba4aa4163a3652fdd3851a0deac
-
memory/1308-83-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1308-76-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2300-88-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2300-85-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2660-63-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2660-55-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2884-7-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2884-0-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2960-1-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2960-5-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2960-18-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2960-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2960-8-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2996-39-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2996-54-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2996-45-0x0000000001F50000-0x0000000001F74000-memory.dmpFilesize
144KB
-
memory/2996-42-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2996-36-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2996-32-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3008-20-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3008-29-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB