Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 19:21
Behavioral task
behavioral1
Sample
1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe
Resource
win7-20240704-en
General
-
Target
1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe
-
Size
84KB
-
MD5
d62eaaefa585328121e5a240d57708d6
-
SHA1
7113f5742f6866246b642c6daf3b68d2ea5e3368
-
SHA256
1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458
-
SHA512
3229d70bb369d019c1f52f4f53f7fdf7989772222dc460aa5488c0928341f910ed8b5273f89caaaba62f7608c8f4e58ee29667585473e14587a3942a19073602
-
SSDEEP
1536:ud9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:2dseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 224 omsecor.exe 2408 omsecor.exe 2580 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1712 wrote to memory of 224 1712 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 91 PID 1712 wrote to memory of 224 1712 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 91 PID 1712 wrote to memory of 224 1712 1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe 91 PID 224 wrote to memory of 2408 224 omsecor.exe 108 PID 224 wrote to memory of 2408 224 omsecor.exe 108 PID 224 wrote to memory of 2408 224 omsecor.exe 108 PID 2408 wrote to memory of 2580 2408 omsecor.exe 109 PID 2408 wrote to memory of 2580 2408 omsecor.exe 109 PID 2408 wrote to memory of 2580 2408 omsecor.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe"C:\Users\Admin\AppData\Local\Temp\1b96841b84c4b62f8a5a4b099ed9ecb7ab661d833693c872f92f81169eb6d458.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4200,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:81⤵PID:4260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5ba6f91f127d8f3f384328feec5b4b5c6
SHA1c3e3fecbe0af0e439616f4a3d653d97c3e28f4e6
SHA256d22508358812100be97bc5cb09df37172abb38092149bea2ece4bbc3044e865e
SHA512ca84116ecff320ae37744d10585f06cc3a69ade1f45caab051390e8259b3cab5fda58b3213f8cc6e166c72e315a9abd3744252c6a8342d415ddd1a429e3bba75
-
Filesize
84KB
MD590f5649cd59ff6219d36687e6ec5ed35
SHA1c46ceea4fc4e75cfb77582677ce1f7f926f7bfd8
SHA25699226164ddc86e200cbad9afbc8315ba5e1d651f9af96b31195af3c279ed0774
SHA51248f9ad8533e6086f97c1a2992c0abc3e0303a583082366cd81a048dc0170c0f29a96854e8cc151eb1774b946fc3a49074defa28929fefa4ead96a1cd555061cf
-
Filesize
84KB
MD50c87b8615ebbb8eb6826f115271ddab5
SHA1addca50c953ca851fd999de88d1891275ac85f8d
SHA256222634e9a618d551450b8451b3d5a7304f3abbdfb14bef73e855f9f4f62f004a
SHA5127f0ef5be6a2c290f2c13646daedc0d5d3a80992c08bb8299853a63140941194ec8c6fba617117f80e8c34b0d7d9496246c18a3ef8966bde46aa07ce9a4b17cb6