Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 01:06
Behavioral task
behavioral1
Sample
35d169697df95ece88cdb45be600da00N.exe
Resource
win7-20240708-en
General
-
Target
35d169697df95ece88cdb45be600da00N.exe
-
Size
92KB
-
MD5
35d169697df95ece88cdb45be600da00
-
SHA1
ecc32b2cf68235b05a0e6fb5895c993d856a676a
-
SHA256
4cb824c73e64179c5940c44df44c3c8477e49b52b10749948c69b1e7e90d8ba9
-
SHA512
48cfaf5cfd4fa1bea9d5647a6e81988605c1551e6ba3a713ab6ca646f1c128f8cf42797c9e3b9ab3b8b85b9f6997fc1080a3d8094bc1418429f9439d147d7e33
-
SSDEEP
1536:+d9dseIOcEE3bIvYvZEyF4EEOF6N4yS+AQmZTl/5:mdseIO/EZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2636 omsecor.exe 2624 omsecor.exe 4592 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35d169697df95ece88cdb45be600da00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1772 wrote to memory of 2636 1772 35d169697df95ece88cdb45be600da00N.exe 83 PID 1772 wrote to memory of 2636 1772 35d169697df95ece88cdb45be600da00N.exe 83 PID 1772 wrote to memory of 2636 1772 35d169697df95ece88cdb45be600da00N.exe 83 PID 2636 wrote to memory of 2624 2636 omsecor.exe 90 PID 2636 wrote to memory of 2624 2636 omsecor.exe 90 PID 2636 wrote to memory of 2624 2636 omsecor.exe 90 PID 2624 wrote to memory of 4592 2624 omsecor.exe 91 PID 2624 wrote to memory of 4592 2624 omsecor.exe 91 PID 2624 wrote to memory of 4592 2624 omsecor.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d169697df95ece88cdb45be600da00N.exe"C:\Users\Admin\AppData\Local\Temp\35d169697df95ece88cdb45be600da00N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4592
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD53162a6482e6d6dbb960e3a9eacdd4814
SHA14c0634cb5ec1255e4234949133e4fd3fac582118
SHA256bf792120f7db4f00a9f164c4a3f41877ab13fed25aa4d28dd9e10df73b99e6c9
SHA512252023d933eb16b5b06093735c59bb41c93e52fcd56818ee9cb618902c715cc229ea75d35ac63e91d2900344b37de28d197c8e618da8ec76e62c51e0ab4b53bb
-
Filesize
92KB
MD5d8a214a105c9cc3c6119a325b1f4ea81
SHA1270bd1e99c8d8e1901d43e340ddc9b07715590a5
SHA256f6ece1f99007abb409ab2d1d88a2ac58c6dbb27f6b521fc3cd6beb0c9252c58d
SHA5129b601494ce955f42cd534449650a95f77ce381e61a27b681a877aaea4659532de579910301128616829b2bf29a416e0d594844cc18b5449f302e525927cc0857
-
Filesize
92KB
MD55dde16ab4847f31a27f1be523625e175
SHA18aa8f46fa152a7ba1f082b60be0f04d07e94b8c7
SHA2563128b476f578766b30ed54682960bb931ff3c6be65c5d70cce7e75b68ca13597
SHA512bf411baa4f08d9e9e34f0eacfcda4b5f8b625b1994828328f6a85d82db5e07a60fda7447bd4bd5c87bd49eea7c3b968ac16bc50cb929d859d7106900e25686cd