Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 00:15
Static task
static1
Behavioral task
behavioral1
Sample
82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe
Resource
win7-20240221-en
General
-
Target
82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe
-
Size
134KB
-
MD5
7afd48e30c7a91408fa59dcf22247121
-
SHA1
099d21e401c05fbe7b0b98b5a01f768fcfa52cc7
-
SHA256
82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d
-
SHA512
e1a23b08a4f8b72480d1a94eef3976f3ab9478792ceaab54a69fa810761efd37bbf8b00d57d454095074fdba12a398b924f4f10ec043ab4af904db8c78299533
-
SSDEEP
1536:sDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:SiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid process 3012 omsecor.exe 2520 omsecor.exe 624 omsecor.exe 776 omsecor.exe 1236 omsecor.exe 1172 omsecor.exe -
Loads dropped DLL 7 IoCs
Processes:
82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exeomsecor.exeomsecor.exeomsecor.exepid process 2972 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 2972 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 3012 omsecor.exe 2520 omsecor.exe 2520 omsecor.exe 776 omsecor.exe 776 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 2860 set thread context of 2972 2860 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe PID 3012 set thread context of 2520 3012 omsecor.exe omsecor.exe PID 624 set thread context of 776 624 omsecor.exe omsecor.exe PID 1236 set thread context of 1172 1236 omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 2860 wrote to memory of 2972 2860 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe PID 2860 wrote to memory of 2972 2860 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe PID 2860 wrote to memory of 2972 2860 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe PID 2860 wrote to memory of 2972 2860 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe PID 2860 wrote to memory of 2972 2860 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe PID 2860 wrote to memory of 2972 2860 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe PID 2972 wrote to memory of 3012 2972 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe omsecor.exe PID 2972 wrote to memory of 3012 2972 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe omsecor.exe PID 2972 wrote to memory of 3012 2972 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe omsecor.exe PID 2972 wrote to memory of 3012 2972 82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe omsecor.exe PID 3012 wrote to memory of 2520 3012 omsecor.exe omsecor.exe PID 3012 wrote to memory of 2520 3012 omsecor.exe omsecor.exe PID 3012 wrote to memory of 2520 3012 omsecor.exe omsecor.exe PID 3012 wrote to memory of 2520 3012 omsecor.exe omsecor.exe PID 3012 wrote to memory of 2520 3012 omsecor.exe omsecor.exe PID 3012 wrote to memory of 2520 3012 omsecor.exe omsecor.exe PID 2520 wrote to memory of 624 2520 omsecor.exe omsecor.exe PID 2520 wrote to memory of 624 2520 omsecor.exe omsecor.exe PID 2520 wrote to memory of 624 2520 omsecor.exe omsecor.exe PID 2520 wrote to memory of 624 2520 omsecor.exe omsecor.exe PID 624 wrote to memory of 776 624 omsecor.exe omsecor.exe PID 624 wrote to memory of 776 624 omsecor.exe omsecor.exe PID 624 wrote to memory of 776 624 omsecor.exe omsecor.exe PID 624 wrote to memory of 776 624 omsecor.exe omsecor.exe PID 624 wrote to memory of 776 624 omsecor.exe omsecor.exe PID 624 wrote to memory of 776 624 omsecor.exe omsecor.exe PID 776 wrote to memory of 1236 776 omsecor.exe omsecor.exe PID 776 wrote to memory of 1236 776 omsecor.exe omsecor.exe PID 776 wrote to memory of 1236 776 omsecor.exe omsecor.exe PID 776 wrote to memory of 1236 776 omsecor.exe omsecor.exe PID 1236 wrote to memory of 1172 1236 omsecor.exe omsecor.exe PID 1236 wrote to memory of 1172 1236 omsecor.exe omsecor.exe PID 1236 wrote to memory of 1172 1236 omsecor.exe omsecor.exe PID 1236 wrote to memory of 1172 1236 omsecor.exe omsecor.exe PID 1236 wrote to memory of 1172 1236 omsecor.exe omsecor.exe PID 1236 wrote to memory of 1172 1236 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe"C:\Users\Admin\AppData\Local\Temp\82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exeC:\Users\Admin\AppData\Local\Temp\82b23e58689adf47787583b9ddda43feeb8ad389493e6fdfc3f648d94095f34d.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
134KB
MD5037917d51161a5f26ab47410bef49659
SHA18a171534c53348e4ddb92476faf01581d1d50000
SHA256fac016b753f681c109a782f64fdacf3b2effde1e6697b1154a2eda7a95695540
SHA512802d33a9ed79ddfafe3f7caa33120482e91e9c69372dffd0c6784c89017e75647b27403c02b7912efd88d73bf11acd945acdfa706b0f71c48d5daa761f372bb1
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
134KB
MD57b4004bc07a209c2bc5d1237d7cc9209
SHA148ec69da5c988aa3248580abfa49cad4b32ee18b
SHA256c5f27147d7cf6799d6f32cac068eeb2fc4d53e8c79b54aed39af552a8ed6f18b
SHA51223b26e8dbc43c866b673a88818544bf06ca2ba87bfbfea49c659d162704dc4394341762da8f5a13dded2e982b07641e76c0196bd90a87ea368fb52d973995a33
-
\Windows\SysWOW64\omsecor.exeFilesize
134KB
MD5fb226a5685ffb946b854e2b392d1e008
SHA176ee4f8f434f67194f52449664657cbdc490ea85
SHA2568bc946ea2fa4f2e3ce0d0acecb92ad2e8312955d68d4ae2233d3218259d0cf34
SHA512579cc51b9f0036d3afee47738b83e07c65802f6684a2978951bfd128cd8c46b0ada4465f6df0991484abeba00b8ae216d6b45ecd01379b3d38a2a281852cf3de
-
memory/624-63-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/624-55-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1172-88-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1172-85-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1236-83-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/1236-76-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2520-32-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2520-33-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2520-39-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2520-42-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2520-45-0x0000000002150000-0x0000000002174000-memory.dmpFilesize
144KB
-
memory/2520-53-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2860-0-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2860-6-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2972-8-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2972-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2972-10-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2972-5-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2972-1-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3012-20-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3012-28-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB