Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 21:59
Behavioral task
behavioral1
Sample
4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe
Resource
win7-20240508-en
General
-
Target
4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe
-
Size
92KB
-
MD5
48039238819621273dd529161aeb486b
-
SHA1
dd984aa2b189d1fefc1da2a70bce8ff9d7ad6b63
-
SHA256
4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418
-
SHA512
54c28a20fb544796a4cd779bb8b1ae79aed6e1f52d1cfb23520e067f9f407b8e6d2a35b1cce9ba2bedbf094e350c790b3bf405d940ce176b393b4fe5fa4f0de2
-
SSDEEP
768:iMEIvFGvoEr8LFK0ic46N47eSvYAHwmZGp6JXXlaa5uA:ibIvYvoEyFKF6N4ySAAQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 1952 omsecor.exe 380 omsecor.exe 620 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exeomsecor.exeomsecor.exepid process 1612 4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe 1612 4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe 1952 omsecor.exe 1952 omsecor.exe 380 omsecor.exe 380 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exeomsecor.exeomsecor.exedescription pid process target process PID 1612 wrote to memory of 1952 1612 4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe omsecor.exe PID 1612 wrote to memory of 1952 1612 4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe omsecor.exe PID 1612 wrote to memory of 1952 1612 4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe omsecor.exe PID 1612 wrote to memory of 1952 1612 4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe omsecor.exe PID 1952 wrote to memory of 380 1952 omsecor.exe omsecor.exe PID 1952 wrote to memory of 380 1952 omsecor.exe omsecor.exe PID 1952 wrote to memory of 380 1952 omsecor.exe omsecor.exe PID 1952 wrote to memory of 380 1952 omsecor.exe omsecor.exe PID 380 wrote to memory of 620 380 omsecor.exe omsecor.exe PID 380 wrote to memory of 620 380 omsecor.exe omsecor.exe PID 380 wrote to memory of 620 380 omsecor.exe omsecor.exe PID 380 wrote to memory of 620 380 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe"C:\Users\Admin\AppData\Local\Temp\4f0bbbb25ad1dc81b80719b0f0b83672fe398bffad82b06f1b118d21a3441418.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
92KB
MD5a2864cedce63bbee3b3e9e92db69953d
SHA174b64a87b2d73fa162009fc4554b612dcce8dedb
SHA25677e72fb7e9b511e876ace38a895819cde78433bfe62423fcc6ad7c978eaa2397
SHA5124a519bf03f4a6c2a10b17cf2a5810270bb94b95f0863b043c69e49042e5e9461b22af2efa2ff56d90c6deaf6841103877c0f161cd8f0cb5f3eb13b4e7b9bf40f
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
92KB
MD58bdfc2035d356787c4000441dc47922a
SHA18d54254516040bb582972ff2cf8296e3b886c8a6
SHA25601763effe2625ed2ac06056474d1e79297e8c99bde006e4cb906248291d71663
SHA512cd26c06c5cb6c475e6cee0b009083e314e72fee661788cea6c44aed9b7ec83909b3c2d02fcf49d7618b6cdd946b6652c7b4e085c4d75fa2415327ff2bc548275
-
\Windows\SysWOW64\omsecor.exeFilesize
92KB
MD57742accb4580cd86d04ff2b8211c9a40
SHA1552c99239e1159e530984a7a3cb7a17571bc2e1e
SHA25674aab2dbe9bb98f8de870ec49e6a7ed781eb5dc9579bd5b0dc2765c9bc0cc343
SHA512cc6a04574131619dfffa6353e58bef8332b7288634ad15716faf601e691babc8f0b6f8171de5fddcac6aaf3967b826b882a8a4774ea94bc045fc1d70bbbe9422
-
memory/380-25-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/380-28-0x0000000001B70000-0x0000000001B9B000-memory.dmpFilesize
172KB
-
memory/620-36-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/620-34-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1612-8-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1612-0-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1952-10-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1952-21-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/1952-15-0x0000000000350000-0x000000000037B000-memory.dmpFilesize
172KB
-
memory/1952-12-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB