Malware Analysis Report

2024-11-16 12:58

Sample ID 240819-gzkwmsybrg
Target c95e67da84009169ba495d2dc2e240c0N.exe
SHA256 88cd1d88dcaa57d9679b7a55eca807b8630f6a31d1128e3ff1efccab5c16bb5c
Tags
neconyd discovery persistence spyware stealer trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

88cd1d88dcaa57d9679b7a55eca807b8630f6a31d1128e3ff1efccab5c16bb5c

Threat Level: Known bad

The file c95e67da84009169ba495d2dc2e240c0N.exe was found to be: Known bad.

Malicious Activity Summary

neconyd discovery persistence spyware stealer trojan upx

Neconyd

Checks computer location settings

UPX packed file

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

Adds Run key to start application

Drops file in System32 directory

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-19 06:14

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-19 06:14

Reported

2024-08-19 06:16

Platform

win7-20240708-en

Max time kernel

116s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

Signatures

Neconyd

trojan neconyd

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Public\Microsoft Build\Isass.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Public\Microsoft Build\Isass.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Public\Microsoft Build\Isass.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2884 wrote to memory of 3024 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2884 wrote to memory of 3024 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2884 wrote to memory of 3024 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2884 wrote to memory of 3024 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2884 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2884 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2884 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2884 wrote to memory of 2764 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2764 wrote to memory of 2624 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2764 wrote to memory of 2624 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2764 wrote to memory of 2624 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2764 wrote to memory of 2624 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2624 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2624 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2624 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2624 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2848 wrote to memory of 2680 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2848 wrote to memory of 2680 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2848 wrote to memory of 2680 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2848 wrote to memory of 2680 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2680 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2680 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2680 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2680 wrote to memory of 2208 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2208 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2208 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2208 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2208 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2176 wrote to memory of 284 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2176 wrote to memory of 284 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2176 wrote to memory of 284 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2176 wrote to memory of 284 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

C:\Users\Public\Microsoft Build\Isass.exe

"C:\Users\Public\Microsoft Build\Isass.exe"

C:\Users\Public\Microsoft Build\Isass.exe

"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

C:\Users\Public\Microsoft Build\Isass.exe

"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 ow5dirasuek.com udp
US 52.34.198.229:80 ow5dirasuek.com tcp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp

Files

C:\Users\Public\Microsoft Build\Isass.exe

MD5 9ee3aea20fa8de7b19353aef20d64baf
SHA1 17926e9fd3e1f03574c94f94cdccd2845fb952a2
SHA256 c6deded1772c32340199c3affea29a61834c3bedf5ab7c5da19aa9ce42dae858
SHA512 4a1d96700f744752862370144b2f74123cef3ffe489a200354c7cd31e52052dcf53b2bea9aad067192fec5f9c610e023f69976768e9cd08b5b53dc5d5fbab767

memory/2884-9-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2884-13-0x0000000004420000-0x00000000056C9000-memory.dmp

memory/3024-16-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2764-17-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3024-15-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2884-12-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2624-19-0x0000000000400000-0x00000000016A8E52-memory.dmp

\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

MD5 50fe69e9c49802d005038522f81e9b06
SHA1 276d8f126ebe06549320d7e324f9e105222d209c
SHA256 72f771647913744c8d3fa98f345b883cfe62ac773363e56d4d08f66fbf0a00db
SHA512 17f6065960e7e54ef24ed2f4f82cd0f92d65aba0aaaac409dbba5b5a9802d7f604a8d4a40e24e1481cbcc5338ccb26b7fea171f2892e4cd1a02fd5b44bb1a7b2

memory/2848-30-0x0000000000400000-0x00000000016A8E52-memory.dmp

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 67b56a5fecd2e6a6598c5d36ba8a40d5
SHA1 dd868ba6efb13ff044dee1b5f78d6966d63f7422
SHA256 c95a8282e4d1c03e38b530ee82a7d761f7091e2edc91c77fc943e955e442610e
SHA512 6df322eccbe17d29388215a7ca49edc1047c97ffe006b1e5f47b05554070bb9e01dff131bdd13e16059d7eb55d6c18628f9639b5faf63c08ce23571b317658ba

memory/2680-39-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3024-42-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3024-43-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2208-44-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3024-47-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3024-49-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3024-57-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2208-58-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3024-59-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3024-68-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3024-70-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2208-71-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3024-79-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2208-80-0x0000000000400000-0x000000000042D000-memory.dmp

\Windows\SysWOW64\omsecor.exe

MD5 4b9e192636dd436efca0120ae52f2c7c
SHA1 dd72e6198ebf277b3312f48801a5d2d97352cf05
SHA256 7c672d77c3df37262af99d46664c784335bb0b8ebe891cef7480db74579fcf29
SHA512 f8a4607cb94b81444c88f44cb32eac960fe96a85b07aec1becfda605a71199fcd7c1d9a755b2f859a95d037ff4b77417a0ba537940a953dbac1642d8928bd125

memory/2208-88-0x0000000000400000-0x000000000042D000-memory.dmp

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 1989bf5facd9f1cb972e61a4b555c8fd
SHA1 2b726d9ab41a6d45adf13c27da4c108345d260ce
SHA256 15b052d40d235334a0e871eede8936d0ab2f7598e894e764a73bc34dd3971079
SHA512 58425e731a506e7e8af39e81111d76b7bf260ea05c996a0f4be43e137f71e777a53cf2bfdcdffbc5a608bf6e8754bc54a2c03adadbb91536ccc429f2afd93775

memory/2176-98-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3024-101-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/284-102-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3024-110-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3024-112-0x0000000000400000-0x00000000016A8E52-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-19 06:14

Reported

2024-08-19 06:16

Platform

win10v2004-20240802-en

Max time kernel

120s

Max time network

106s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

Signatures

Neconyd

trojan neconyd

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation C:\Users\Public\Microsoft Build\Isass.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation C:\Users\Public\Microsoft Build\Isass.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation C:\Users\Public\Microsoft Build\Isass.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Isass.exe = "C:\\Users\\Public\\Microsoft Build\\Isass.exe" C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Public\Microsoft Build\Isass.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Public\Microsoft Build\Isass.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Public\Microsoft Build\Isass.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Public\Microsoft Build\Isass.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\omsecor.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A
N/A N/A C:\Users\Public\Microsoft Build\Isass.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4984 wrote to memory of 3716 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 4984 wrote to memory of 3716 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 4984 wrote to memory of 3716 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 4984 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 4984 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 4984 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2396 wrote to memory of 2640 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2396 wrote to memory of 2640 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2396 wrote to memory of 2640 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2640 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2640 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2640 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2468 wrote to memory of 2164 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2468 wrote to memory of 2164 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2468 wrote to memory of 2164 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2164 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2164 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 2164 wrote to memory of 1808 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Public\Microsoft Build\Isass.exe
PID 1808 wrote to memory of 2672 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 1808 wrote to memory of 2672 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 1808 wrote to memory of 2672 N/A C:\Users\Public\Microsoft Build\Isass.exe C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe
PID 2672 wrote to memory of 4468 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2672 wrote to memory of 4468 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2672 wrote to memory of 4468 N/A C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 4468 wrote to memory of 3808 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 4468 wrote to memory of 3808 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 4468 wrote to memory of 3808 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 3808 wrote to memory of 4944 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 3808 wrote to memory of 4944 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 3808 wrote to memory of 4944 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

C:\Users\Public\Microsoft Build\Isass.exe

"C:\Users\Public\Microsoft Build\Isass.exe"

C:\Users\Public\Microsoft Build\Isass.exe

"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

C:\Users\Public\Microsoft Build\Isass.exe

"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

C:\Users\Public\Microsoft Build\Isass.exe

"C:\Users\Public\Microsoft Build\Isass.exe" Tablet C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

"C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 8.8.8.8:53 240.143.123.92.in-addr.arpa udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 73.91.225.64.in-addr.arpa udp
US 8.8.8.8:53 ow5dirasuek.com udp
US 52.34.198.229:80 ow5dirasuek.com tcp
US 8.8.8.8:53 229.198.34.52.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

memory/4984-1-0x0000000000400000-0x00000000016A8E52-memory.dmp

C:\Users\Public\Microsoft Build\Isass.exe

MD5 9ee3aea20fa8de7b19353aef20d64baf
SHA1 17926e9fd3e1f03574c94f94cdccd2845fb952a2
SHA256 c6deded1772c32340199c3affea29a61834c3bedf5ab7c5da19aa9ce42dae858
SHA512 4a1d96700f744752862370144b2f74123cef3ffe489a200354c7cd31e52052dcf53b2bea9aad067192fec5f9c610e023f69976768e9cd08b5b53dc5d5fbab767

memory/3716-5-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3716-7-0x0000000001C60000-0x0000000001C61000-memory.dmp

memory/4984-6-0x0000000001AA0000-0x0000000001AA1000-memory.dmp

memory/4984-9-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2396-10-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2396-11-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2640-12-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2640-14-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2468-15-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2468-17-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/2164-19-0x0000000000400000-0x00000000016A8E52-memory.dmp

C:\Users\Admin\AppData\Local\Temp\c95e67da84009169ba495d2dc2e240c0N.exe

MD5 50fe69e9c49802d005038522f81e9b06
SHA1 276d8f126ebe06549320d7e324f9e105222d209c
SHA256 72f771647913744c8d3fa98f345b883cfe62ac773363e56d4d08f66fbf0a00db
SHA512 17f6065960e7e54ef24ed2f4f82cd0f92d65aba0aaaac409dbba5b5a9802d7f604a8d4a40e24e1481cbcc5338ccb26b7fea171f2892e4cd1a02fd5b44bb1a7b2

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 67b56a5fecd2e6a6598c5d36ba8a40d5
SHA1 dd868ba6efb13ff044dee1b5f78d6966d63f7422
SHA256 c95a8282e4d1c03e38b530ee82a7d761f7091e2edc91c77fc943e955e442610e
SHA512 6df322eccbe17d29388215a7ca49edc1047c97ffe006b1e5f47b05554070bb9e01dff131bdd13e16059d7eb55d6c18628f9639b5faf63c08ce23571b317658ba

memory/2672-33-0x0000000000400000-0x000000000042D000-memory.dmp

memory/1808-27-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3716-34-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3716-35-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/4468-36-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3716-39-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3716-41-0x0000000000400000-0x00000000016A8E52-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe

MD5 e9bd2d1d0c612ef4375fdec99b526282
SHA1 a2d836daf8fe264a0e5e07d2fa4f350a025b751d
SHA256 4154b4494a5542dee7924a9ddacee0fcb3aaf2532d2c675c14e494993e06493b
SHA512 628504edade4b608d36eded95381c02ce7c81203b0adc67e9788c5b5c9b54c4a735e0efad4c399c6ab54ea446c33dfbe44441eac9b5f3a370be6a7aab3146d32

memory/3716-46-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/4468-47-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3716-48-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3716-57-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3716-59-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/4468-60-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3716-66-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/4468-67-0x0000000000400000-0x000000000042D000-memory.dmp

C:\Windows\SysWOW64\omsecor.exe

MD5 933a5e25533ef7178f519bde6a836ac5
SHA1 80302ecb5940a14030c57760a44baf3271dd143a
SHA256 876744e5adbe38d9dc8e20239166912add97f6c4ffbf4d8f003df1fc46cc9513
SHA512 c19e745e36750d8c351d1e666ab80e2f75731d0c264d051b481581a8c25f56747955f1787f506707ba1be0dc5ed196a6cd7c4f16aaf9588ddffa4acd0d8f9439

memory/4468-71-0x0000000000400000-0x000000000042D000-memory.dmp

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 eb3067223b4757bf1b5625b42bae143f
SHA1 8af5f650e7e3cd05fa02b4ab48d48fd3bde187d7
SHA256 16f8f0613d5e0189bc968c4f04c8da809d6ed4b6f38da07a7fb7c9655280288c
SHA512 ed2c615adad78f09ed2e8a5125c5072de3433e47e697ab7c51d3d28e78fcaac7f4459d48cd1f7459c71adeffdeb53b901c7558e848836d6bb0e91e729e51fef7

memory/3808-76-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3716-78-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/4944-86-0x0000000000400000-0x000000000042D000-memory.dmp

memory/3716-85-0x0000000000400000-0x00000000016A8E52-memory.dmp

memory/3716-87-0x0000000000400000-0x00000000016A8E52-memory.dmp