Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 04:01
Behavioral task
behavioral1
Sample
b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e.exe
Resource
win7-20240704-en
General
-
Target
b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e.exe
-
Size
68KB
-
MD5
b530c4fe3f111bdddf76daa295c23bd7
-
SHA1
e74db6543df2ecd0de6c54d769159d82643aa730
-
SHA256
b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e
-
SHA512
09cb31db2e4d9cc96310f843d99631b3b5a28c86908da82f684cc9469a64f9584b119a32979283a02c3f6ae94d5653b86ceee4937107a3c2388bd054b6072dc9
-
SSDEEP
1536:Gd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:+dseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2224 omsecor.exe 3816 omsecor.exe 4384 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3884 wrote to memory of 2224 3884 b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e.exe 84 PID 3884 wrote to memory of 2224 3884 b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e.exe 84 PID 3884 wrote to memory of 2224 3884 b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e.exe 84 PID 2224 wrote to memory of 3816 2224 omsecor.exe 90 PID 2224 wrote to memory of 3816 2224 omsecor.exe 90 PID 2224 wrote to memory of 3816 2224 omsecor.exe 90 PID 3816 wrote to memory of 4384 3816 omsecor.exe 91 PID 3816 wrote to memory of 4384 3816 omsecor.exe 91 PID 3816 wrote to memory of 4384 3816 omsecor.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e.exe"C:\Users\Admin\AppData\Local\Temp\b3bb1a6e4e845875cb88ad6ef1ce3874e5f437c1d3530a787fd2582ee8cd4b9e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5d2264b08e1f0aad2a02ffb03650f8c01
SHA1abc448537e01cfde683e48c0f56f6375852820aa
SHA256f4613f8bfa917fb307b88213017fcdb65ff47ce753901e6d8d91d150e7c14660
SHA512e20719709e163ac71ee113a3a8cf3a5e98744cff0ecad9c616799f99464ab71bc35ef28ad757764950465a8171def332f9ad9a93981a0ccc400cf399a5d75fd1
-
Filesize
68KB
MD5985b5f0de304c43b59e72da19898a120
SHA18ff32aca451d560ba8c1fd1ba441838baa757a5b
SHA25679118f3edb3c9df61157b1056bb61506aee25e593bdb63793af7eeef2218b287
SHA5121eca9e54928ba2c2c6a1b4eb27282e5dd4f36ba96f7aabcaca7a36c0e878ecd27f85b33dfdb4378e0bc00e3055f68519dd1ae7633212b2d02f60edb0eec910bf
-
Filesize
68KB
MD5f88f45f6f42af019731aec651c74f428
SHA125d19fba61e6a1af33681f0a3066532b98fb94be
SHA2566b6bcc15cea91814279a68ca9eae5cd40258f85b5adfcc005e37ae24d0769204
SHA51231b3baf69145394b954e4b8fce5226c3feff5f025e89b6603e397b2853f740b42a02fda7f7e77fa0944893bace18ba4251d30253533b733a87074091ccd8f3c6