Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 19:21
Behavioral task
behavioral1
Sample
1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe
Resource
win7-20240704-en
General
-
Target
1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe
-
Size
84KB
-
MD5
d62eaaefa585328121e5a240d57708d6
-
SHA1
7113f5742f6866246b642c6daf3b68d2ea5e3368
-
SHA256
1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458
-
SHA512
3229d70bb369d019c1f52f4f53f7fdf7989772222dc460aa5488c0928341f910ed8b5273f89caaaba62f7608c8f4e58ee29667585473e14587a3942a19073602
-
SSDEEP
1536:ud9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:2dseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2788 omsecor.exe 2812 omsecor.exe 2948 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2732 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 2732 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 2788 omsecor.exe 2788 omsecor.exe 2812 omsecor.exe 2812 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2788 2732 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 30 PID 2732 wrote to memory of 2788 2732 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 30 PID 2732 wrote to memory of 2788 2732 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 30 PID 2732 wrote to memory of 2788 2732 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 30 PID 2788 wrote to memory of 2812 2788 omsecor.exe 33 PID 2788 wrote to memory of 2812 2788 omsecor.exe 33 PID 2788 wrote to memory of 2812 2788 omsecor.exe 33 PID 2788 wrote to memory of 2812 2788 omsecor.exe 33 PID 2812 wrote to memory of 2948 2812 omsecor.exe 34 PID 2812 wrote to memory of 2948 2812 omsecor.exe 34 PID 2812 wrote to memory of 2948 2812 omsecor.exe 34 PID 2812 wrote to memory of 2948 2812 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe"C:\Users\Admin\AppData\Local\Temp\1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD590f5649cd59ff6219d36687e6ec5ed35
SHA1c46ceea4fc4e75cfb77582677ce1f7f926f7bfd8
SHA25699226164ddc86e200cbad9afbc8315ba5e1d651f9af96b31195af3c279ed0774
SHA51248f9ad8533e6086f97c1a2992c0abc3e0303a583082366cd81a048dc0170c0f29a96854e8cc151eb1774b946fc3a49074defa28929fefa4ead96a1cd555061cf
-
Filesize
84KB
MD576a18d35730cb3527e404e201554b127
SHA115b3c0936e9023a3c06b77197526a048876faf91
SHA2564ac45c44d3fb9efbd353c827876665cd7e3742e1bc82b7d496f697725d2bb8d5
SHA512e91749dbe7de659251565ca8e5b2ca550252eca698e517d83e6d2110266278c75dd6fff0de5ede7e89905e03f450b561d8b6f5d79522124e05d3c3de5471b530
-
Filesize
84KB
MD57f7eeaecdb70cb8dde772060b14dd719
SHA18c29bfcd97e603d3a1b5ccb223e5fcdbd6af9706
SHA256821732fcdcb5624930ff49259587589a7d549913425d49832b4351c5c0fa2516
SHA5128e94c2b55049a7859685054fee7b5f31deadefa7f3a4702cefaca90a1bb8a0d4c6af2e4d1fa7a005c58bccc340c32da4e2aaedf4730ecec0267fa9dabe25af06