Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 20:46
Behavioral task
behavioral1
Sample
3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6.exe
Resource
win7-20231129-en
General
-
Target
3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6.exe
-
Size
35KB
-
MD5
5c976cc0ae922d683fda7143d7f00624
-
SHA1
7229b68a02f34b51685e76bd4f5fdca6b18634fa
-
SHA256
3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6
-
SHA512
092e21992c72879684fad918738088d18303c6661b3b6d2e25c80a2f0ae3ccfcb6e5ef53d9931ba5f254269c1e8354855c9c59369d31b1c1e40add874b3892bb
-
SSDEEP
768:i6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:R8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 3500 omsecor.exe 2416 omsecor.exe 452 omsecor.exe -
Processes:
resource yara_rule behavioral2/memory/3152-0-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral2/memory/3152-5-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3500-6-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3500-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3500-10-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3500-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3500-14-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Windows\SysWOW64\omsecor.exe upx behavioral2/memory/3500-19-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2416-21-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2416-26-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral2/memory/452-27-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/452-29-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/452-32-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6.exeomsecor.exeomsecor.exedescription pid process target process PID 3152 wrote to memory of 3500 3152 3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6.exe omsecor.exe PID 3152 wrote to memory of 3500 3152 3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6.exe omsecor.exe PID 3152 wrote to memory of 3500 3152 3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6.exe omsecor.exe PID 3500 wrote to memory of 2416 3500 omsecor.exe omsecor.exe PID 3500 wrote to memory of 2416 3500 omsecor.exe omsecor.exe PID 3500 wrote to memory of 2416 3500 omsecor.exe omsecor.exe PID 2416 wrote to memory of 452 2416 omsecor.exe omsecor.exe PID 2416 wrote to memory of 452 2416 omsecor.exe omsecor.exe PID 2416 wrote to memory of 452 2416 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6.exe"C:\Users\Admin\AppData\Local\Temp\3c014cc9f2646064bf7c9b5fbcad16528a9fe9c532179a6468ce1f2946b6acd6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1036,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:81⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD53cdd4dc8fd15885fe545e8acf7c016ac
SHA19071e6d15ba0fb2e132daf9064afbc7b067bb8b8
SHA2562ac90bc6530dbdcf025b5bd08bb9d9a29bffef98463dc7fcc19189c4510d67a3
SHA512443013daec362fccecd5d00f66381aeba8a8a44e5f1bc5e1202b1dd7e3ce6e79293a6fe032d1e8fcf7b2c08ed18c5e2e481f741cbe8533333eb7c912d149cd89
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD594649c28606d6e3aa3622bc1db94a390
SHA1ee4545baf07a4b156bbb4bc96db63da5efe75238
SHA25630c57dbb22b534f0104ac3fe63e0ebfb8cd831857e092a8dae2e2afdb1b0832c
SHA51257b3d996118ddc487d26429120bd127d45132e8b8b39a687efeebdb6ef20639a3f58286ba1924e5671f605a7d8a38669f33469e8360a9f11fc8f13575ba2ed9f
-
C:\Windows\SysWOW64\omsecor.exeFilesize
35KB
MD5d7653d7bb5e1abd7aba673a794937c1b
SHA1afd32ce7f5c9bcfbf930dce718a086577ecc7ecd
SHA256b8e8f5be837fb6f87337fa0b1fa8d657645963d54d055e10862549d5ca18b01b
SHA5122298b3151ba6dc87e2a48fc7c3f53760306ab5c6169d9fa59db58243915b7d2f5b71aaa7a0eeca3b973b8e7aebfc715aa4415d01bec649b7a97c4e550b6ae7e5
-
memory/452-32-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/452-29-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/452-27-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2416-21-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2416-26-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3152-5-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3152-0-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3500-13-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3500-19-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3500-14-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3500-6-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3500-10-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3500-7-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB