Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 00:38
Behavioral task
behavioral1
Sample
35dc7b0f47bc9b224b4268d07fa1f2b0N.exe
Resource
win7-20240704-en
General
-
Target
35dc7b0f47bc9b224b4268d07fa1f2b0N.exe
-
Size
71KB
-
MD5
35dc7b0f47bc9b224b4268d07fa1f2b0
-
SHA1
ac92f59343c2d4d900ca03b36b7570a9aa897468
-
SHA256
43ca3b6181c95ea2e1fa8d001ab33f82930c7d8640c1adcffcdface45be8757b
-
SHA512
b8be78bcbceca5dda7acba485d008c6681244562006db28fbfabe70e5cddd1d404680931945b161aa8d5f67d3eb9abd993ea06504584aba4f70f4940ca5d6282
-
SSDEEP
1536:ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:6dseIOMEZEyFjEOFqTiQmQDHIbH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2704 omsecor.exe 1972 omsecor.exe 2956 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2884 35dc7b0f47bc9b224b4268d07fa1f2b0N.exe 2884 35dc7b0f47bc9b224b4268d07fa1f2b0N.exe 2704 omsecor.exe 2704 omsecor.exe 1972 omsecor.exe 1972 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2704 2884 35dc7b0f47bc9b224b4268d07fa1f2b0N.exe 29 PID 2884 wrote to memory of 2704 2884 35dc7b0f47bc9b224b4268d07fa1f2b0N.exe 29 PID 2884 wrote to memory of 2704 2884 35dc7b0f47bc9b224b4268d07fa1f2b0N.exe 29 PID 2884 wrote to memory of 2704 2884 35dc7b0f47bc9b224b4268d07fa1f2b0N.exe 29 PID 2704 wrote to memory of 1972 2704 omsecor.exe 31 PID 2704 wrote to memory of 1972 2704 omsecor.exe 31 PID 2704 wrote to memory of 1972 2704 omsecor.exe 31 PID 2704 wrote to memory of 1972 2704 omsecor.exe 31 PID 1972 wrote to memory of 2956 1972 omsecor.exe 32 PID 1972 wrote to memory of 2956 1972 omsecor.exe 32 PID 1972 wrote to memory of 2956 1972 omsecor.exe 32 PID 1972 wrote to memory of 2956 1972 omsecor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\35dc7b0f47bc9b224b4268d07fa1f2b0N.exe"C:\Users\Admin\AppData\Local\Temp\35dc7b0f47bc9b224b4268d07fa1f2b0N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:2956
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD58efac0166f27b734ec3b0b029733429e
SHA17cf001340f9fbfa92e76c790eccb5280ef2b4c34
SHA256b78ac26cf26f689563200143569fa55c103140b781a542551b96adc42d3b0878
SHA512f3dda91f46b368b84a2c2f0d57fc42f2f607b4bb072e854b69e49d1064860e1526c73e747ed0e5f49aa72d97c2cc039db456dd9544640d05f4057cec856787a1
-
Filesize
71KB
MD59b5ef530708d2fd57ca73f7d73714796
SHA18830b1ed28ea4e8dab9ee378796938e81c084f3f
SHA256b1599b3b0cddc655ea0fca50d339462d9e2a20b6387dbdbb2b869c4676e51ac8
SHA512bcd5b83f42f86d2601b0343555382b8d7a2d198890aabdf3de76146933c2e54b58a10deadabcacd64789384c9ca8c6fed75483da770b389b340710e8a553f9f7
-
Filesize
71KB
MD5321bc4d038f0ade3b8db40a558ff07c0
SHA1cd98cf6310bee0aad6871ee9426512a7d0cf1998
SHA256049f8e2fc853796ca8aa187b5ada5142f9d568698834759c62020e8d89ddc1b4
SHA5122555c2ace4c2117603c4ae487c4ac8d2371649618f0fed1fe133ddd23dd5633b8acdb3eb26e786c9796e869e6b417b61a23b81951bbdd1df14c56ac35fc6aa73