Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 15:52
Behavioral task
behavioral1
Sample
6b9f893b651a4c9f9bce4860abcf5210N.exe
Resource
win7-20240704-en
General
-
Target
6b9f893b651a4c9f9bce4860abcf5210N.exe
-
Size
92KB
-
MD5
6b9f893b651a4c9f9bce4860abcf5210
-
SHA1
2b40dee78eb457c2a6481d6eec8cfa621a7a2135
-
SHA256
a61c1566c8c60a14329ac3217712afdd022b4677aa9538a5d98fae9f9752de6f
-
SHA512
d96a0b5d8f9afb0c5af8b49fad2c97ce2f53f2f328d72932622e866a70b7b6f6af748978875c78689f5da1cdc1cc4b013884ec8a8765f2364d3c3ac4448c8247
-
SSDEEP
1536:zd9dseIOcEE3bIvYvZEyF4EEOF6N4yS+AQmZTl/5:zdseIO/EZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4860 omsecor.exe 1420 omsecor.exe 4056 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b9f893b651a4c9f9bce4860abcf5210N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4860 3632 6b9f893b651a4c9f9bce4860abcf5210N.exe 85 PID 3632 wrote to memory of 4860 3632 6b9f893b651a4c9f9bce4860abcf5210N.exe 85 PID 3632 wrote to memory of 4860 3632 6b9f893b651a4c9f9bce4860abcf5210N.exe 85 PID 4860 wrote to memory of 1420 4860 omsecor.exe 102 PID 4860 wrote to memory of 1420 4860 omsecor.exe 102 PID 4860 wrote to memory of 1420 4860 omsecor.exe 102 PID 1420 wrote to memory of 4056 1420 omsecor.exe 103 PID 1420 wrote to memory of 4056 1420 omsecor.exe 103 PID 1420 wrote to memory of 4056 1420 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b9f893b651a4c9f9bce4860abcf5210N.exe"C:\Users\Admin\AppData\Local\Temp\6b9f893b651a4c9f9bce4860abcf5210N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD578f42182786675aacd323282136e79bd
SHA182f6a1607c8eb97970dd428e00eb05f5bf396064
SHA256332655562821436139697eaa926f4b003d056b113b933ee750ccde97bb2d7f92
SHA5126f022c7fd06fb6245af6e53377463340f881e1bb32be107addf346598224d57e9fee8affc9f69c21b02e4e6eaf5761e3c70d92a114042b70cf3b48300a3d390b
-
Filesize
92KB
MD5fff7a8898ed69d53a1069422e07a8cf5
SHA1173e886d68080a89b678d83fc81dae27bf4eec2e
SHA256a34a8cb30dc6de3e649ca267af3ab484cf9dc417b71e037a27b88466a3d25c87
SHA5123cdcbbaa41b5e52de0c442bc933457d09285d55feb77878f3a5aaad69c1df94d79b9bdebe3ae6e78a15fca90c7337cdc0995bdd23abed3a65c47599e92ac8579
-
Filesize
92KB
MD52e0a4d70b61e86b0fddb1156171c16ae
SHA153a28eb35500d1af285729ed7f09fc2ef4962b7e
SHA256bd6af2c53d2ee63da8ebf3cc78bc3c90f4ee8a31e4133171c87f342ec57dfab7
SHA5121126a7b8658371afa14bf87b5962182399547ff8e40e09ca546066ba787207232390f3634fc675a524db531229574e4145b7292e932b8fcf39890d0c536c839d