Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 23:38
Behavioral task
behavioral1
Sample
2dd069da99cf55a18fd2ebdd016e6ba0N.exe
Resource
win7-20240708-en
General
-
Target
2dd069da99cf55a18fd2ebdd016e6ba0N.exe
-
Size
35KB
-
MD5
2dd069da99cf55a18fd2ebdd016e6ba0
-
SHA1
7d741c26b775b651ef58356fb12302f2d1a10211
-
SHA256
f3e23a69b9ecbed6c605290c8e00dd09976f24b686bcbb18784b0d81da22d665
-
SHA512
79ec9c897b49d7127d00f5e812f3fe86ecf379f3a3c4ac2a3c2e701d3be2db3469f023a971bc5567ff75a472cccee944a8376c99f3ca5704779d0bf1bb76af79
-
SSDEEP
768:N6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:A8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4524 omsecor.exe 116 omsecor.exe 2276 omsecor.exe -
resource yara_rule behavioral2/memory/1444-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x0009000000023474-3.dat upx behavioral2/memory/4524-4-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1444-6-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4524-8-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4524-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4524-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4524-15-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000400000001e744-18.dat upx behavioral2/memory/4524-21-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/116-22-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x0009000000023474-25.dat upx behavioral2/memory/116-27-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2276-28-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2276-30-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1444 wrote to memory of 4524 1444 2dd069da99cf55a18fd2ebdd016e6ba0N.exe 84 PID 1444 wrote to memory of 4524 1444 2dd069da99cf55a18fd2ebdd016e6ba0N.exe 84 PID 1444 wrote to memory of 4524 1444 2dd069da99cf55a18fd2ebdd016e6ba0N.exe 84 PID 4524 wrote to memory of 116 4524 omsecor.exe 100 PID 4524 wrote to memory of 116 4524 omsecor.exe 100 PID 4524 wrote to memory of 116 4524 omsecor.exe 100 PID 116 wrote to memory of 2276 116 omsecor.exe 101 PID 116 wrote to memory of 2276 116 omsecor.exe 101 PID 116 wrote to memory of 2276 116 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dd069da99cf55a18fd2ebdd016e6ba0N.exe"C:\Users\Admin\AppData\Local\Temp\2dd069da99cf55a18fd2ebdd016e6ba0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:2276
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5ccf9e10cf977b7c23a7f2a8345bc5b5b
SHA1e67da844befed8bc9b84afc0783da3ad87cf7844
SHA256780d8192b2b5d43a856bb2657d5f26d03bed480c2ec44a9ce06083e0ac339b85
SHA51219459ccaf4538163e31cc8694f86d8308fd8c3fe8c3d369193e12ac5762be839f1a2d41e0c5b4e03ae83f1aa891be4128e718de5a451555f7793351d11cb12b1
-
Filesize
35KB
MD5923f64bb856b9462a3d7b7042a00eed1
SHA108d353bda5535bab6dd039027025592f43782f7d
SHA2567c3b47509a049218ac27af0e62a2b659e1a6d6284799beaccc7fa29f321b1851
SHA512b49071aad3f40f39669fee5830431db523607bed5a65a47840bb60b88d090c70eb607072658d3e9093cc61a73753bb191922259c4efc8ae67717c38a58fac34b
-
Filesize
35KB
MD5813ed8527c066be3ed25d0607da96022
SHA1af0aea0fb03d11636089852bd059d785b9ed2b74
SHA256f0063b5b554d192d6155186577277b80257ce252ef8eabd996a27423a01b3421
SHA512183733d780c55ad4dbbc8cef6edc4b7ca74b7c3a9157f5d7e83d38a8f86225cd35598780b0b8e09ac2945dc9946b49eccfc4779f7bf8a042d61269937c3156a5