Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-07-2024 05:38
Behavioral task
behavioral1
Sample
458f57f74187638d4e9d10336bd8bd30N.exe
Resource
win7-20240705-en
General
-
Target
458f57f74187638d4e9d10336bd8bd30N.exe
-
Size
88KB
-
MD5
458f57f74187638d4e9d10336bd8bd30
-
SHA1
f52f03ba0f62aaba58f1a542eb61ab968217a3f7
-
SHA256
dd60cb6e921170cbd1a6d487628f8e9ff229c82de2466bee6571eda95acb9048
-
SHA512
de197f4629b1e85b07990a35dca3360cec3eef7301cfff0483db70561cdb71f3813232b7c717ffc3880f8408931c86cc24a807b82658234663a66f5d06cb4f82
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:LdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2340 omsecor.exe 2412 omsecor.exe 2880 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 656 458f57f74187638d4e9d10336bd8bd30N.exe 656 458f57f74187638d4e9d10336bd8bd30N.exe 2340 omsecor.exe 2340 omsecor.exe 2412 omsecor.exe 2412 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 656 wrote to memory of 2340 656 458f57f74187638d4e9d10336bd8bd30N.exe 30 PID 656 wrote to memory of 2340 656 458f57f74187638d4e9d10336bd8bd30N.exe 30 PID 656 wrote to memory of 2340 656 458f57f74187638d4e9d10336bd8bd30N.exe 30 PID 656 wrote to memory of 2340 656 458f57f74187638d4e9d10336bd8bd30N.exe 30 PID 2340 wrote to memory of 2412 2340 omsecor.exe 32 PID 2340 wrote to memory of 2412 2340 omsecor.exe 32 PID 2340 wrote to memory of 2412 2340 omsecor.exe 32 PID 2340 wrote to memory of 2412 2340 omsecor.exe 32 PID 2412 wrote to memory of 2880 2412 omsecor.exe 33 PID 2412 wrote to memory of 2880 2412 omsecor.exe 33 PID 2412 wrote to memory of 2880 2412 omsecor.exe 33 PID 2412 wrote to memory of 2880 2412 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\458f57f74187638d4e9d10336bd8bd30N.exe"C:\Users\Admin\AppData\Local\Temp\458f57f74187638d4e9d10336bd8bd30N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:2880
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD50fbb916343b80a8030f6da3884c4265f
SHA1ecc6ab6763d2fc86de411118a73369c38a944b8d
SHA256966c327e4004b3874c39c0ef8d6a3b775d7bf55559c35f7b40036b6947520cab
SHA5120e3546382dddeab28d9b932bd2ed1942330c442b3df1b984a7d890dd2a245cb59f1e88393edd738ae21cfa8af8b175ed19404ba9e1003d16b06a5ddc16a6a986
-
Filesize
88KB
MD54c73acf5af3bf0a9ca569805102321be
SHA153be636e2d99cd009fd8a8c37bfb9edbef7df5a7
SHA25675eb1ef8197f055adfb46768ccdd391cf527175f7dd5d45a576d3caa5900f867
SHA5120ef0cdec4f4943a9bf6d89c654155420356ca12898eb439ac675f84028fe0242bad452133215eaabbd3d3b900d37624ceb8f23b1b3b371a1d5855aea228ee976
-
Filesize
88KB
MD52be810f9de69e449b60f246a4a5761a2
SHA1b919b51c1b3fe92fe3806669f746908dbb44d8e3
SHA256d51b7d95e0efbaca349c542974cc022f6da0d8eeb3cc13587772ee32b67a717a
SHA5123ee8c03a4e2ac26af6ea539dfad804b0d5a49635934030e90c794023bb979694b357108b8e1b7bc828a1ad91e2355f8c0940eda200f432784c11d9da6399cab1