Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
04d21740aea37873f548dcd73bdb0f90N.exe
Resource
win7-20240708-en
General
-
Target
04d21740aea37873f548dcd73bdb0f90N.exe
-
Size
134KB
-
MD5
04d21740aea37873f548dcd73bdb0f90
-
SHA1
d4b1d81498bcf33094756f722229bf813af163b4
-
SHA256
04fa89879d9bddd30b2d38f901a2fab449525b92dcaa89a5132d58cf2135ac30
-
SHA512
7b95840aeac9fb90d8dee4b22804f6139f4c9ac4937376c0845c9359ef2db0152b6ebc8b9fb1417e6498f0cffbe14e18829dfc3dd506f7acfb9b41d7c4c5a745
-
SSDEEP
1536:5DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:piRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2724 omsecor.exe 2780 omsecor.exe 3020 omsecor.exe 480 omsecor.exe 2040 omsecor.exe 760 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2764 04d21740aea37873f548dcd73bdb0f90N.exe 2764 04d21740aea37873f548dcd73bdb0f90N.exe 2724 omsecor.exe 2780 omsecor.exe 2780 omsecor.exe 480 omsecor.exe 480 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2352 set thread context of 2764 2352 04d21740aea37873f548dcd73bdb0f90N.exe 30 PID 2724 set thread context of 2780 2724 omsecor.exe 32 PID 3020 set thread context of 480 3020 omsecor.exe 36 PID 2040 set thread context of 760 2040 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04d21740aea37873f548dcd73bdb0f90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04d21740aea37873f548dcd73bdb0f90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2764 2352 04d21740aea37873f548dcd73bdb0f90N.exe 30 PID 2352 wrote to memory of 2764 2352 04d21740aea37873f548dcd73bdb0f90N.exe 30 PID 2352 wrote to memory of 2764 2352 04d21740aea37873f548dcd73bdb0f90N.exe 30 PID 2352 wrote to memory of 2764 2352 04d21740aea37873f548dcd73bdb0f90N.exe 30 PID 2352 wrote to memory of 2764 2352 04d21740aea37873f548dcd73bdb0f90N.exe 30 PID 2352 wrote to memory of 2764 2352 04d21740aea37873f548dcd73bdb0f90N.exe 30 PID 2764 wrote to memory of 2724 2764 04d21740aea37873f548dcd73bdb0f90N.exe 31 PID 2764 wrote to memory of 2724 2764 04d21740aea37873f548dcd73bdb0f90N.exe 31 PID 2764 wrote to memory of 2724 2764 04d21740aea37873f548dcd73bdb0f90N.exe 31 PID 2764 wrote to memory of 2724 2764 04d21740aea37873f548dcd73bdb0f90N.exe 31 PID 2724 wrote to memory of 2780 2724 omsecor.exe 32 PID 2724 wrote to memory of 2780 2724 omsecor.exe 32 PID 2724 wrote to memory of 2780 2724 omsecor.exe 32 PID 2724 wrote to memory of 2780 2724 omsecor.exe 32 PID 2724 wrote to memory of 2780 2724 omsecor.exe 32 PID 2724 wrote to memory of 2780 2724 omsecor.exe 32 PID 2780 wrote to memory of 3020 2780 omsecor.exe 35 PID 2780 wrote to memory of 3020 2780 omsecor.exe 35 PID 2780 wrote to memory of 3020 2780 omsecor.exe 35 PID 2780 wrote to memory of 3020 2780 omsecor.exe 35 PID 3020 wrote to memory of 480 3020 omsecor.exe 36 PID 3020 wrote to memory of 480 3020 omsecor.exe 36 PID 3020 wrote to memory of 480 3020 omsecor.exe 36 PID 3020 wrote to memory of 480 3020 omsecor.exe 36 PID 3020 wrote to memory of 480 3020 omsecor.exe 36 PID 3020 wrote to memory of 480 3020 omsecor.exe 36 PID 480 wrote to memory of 2040 480 omsecor.exe 37 PID 480 wrote to memory of 2040 480 omsecor.exe 37 PID 480 wrote to memory of 2040 480 omsecor.exe 37 PID 480 wrote to memory of 2040 480 omsecor.exe 37 PID 2040 wrote to memory of 760 2040 omsecor.exe 38 PID 2040 wrote to memory of 760 2040 omsecor.exe 38 PID 2040 wrote to memory of 760 2040 omsecor.exe 38 PID 2040 wrote to memory of 760 2040 omsecor.exe 38 PID 2040 wrote to memory of 760 2040 omsecor.exe 38 PID 2040 wrote to memory of 760 2040 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d21740aea37873f548dcd73bdb0f90N.exe"C:\Users\Admin\AppData\Local\Temp\04d21740aea37873f548dcd73bdb0f90N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\04d21740aea37873f548dcd73bdb0f90N.exeC:\Users\Admin\AppData\Local\Temp\04d21740aea37873f548dcd73bdb0f90N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:760
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56a8fd538ced54e2d55c92241e979c0c2
SHA1aae8fd739646026d3ba31970af2fc1774749d5e8
SHA2562bd444629d307f575c03dad9704f67b844743eab723f80e79acea377a892aeb6
SHA512c51aae3347993990995444ac084dbfdc1ceb73c9fd4672dba79a3e07eed1d301561eea6447b63fdd9f347e823561f327241cfba02876f57fae6ba9c206e1b3fe
-
Filesize
134KB
MD5b6c51de761b38e826903f61fd0936ea2
SHA18a60762f2d4d4e0f79746188397dd07a6f6b0bee
SHA2567d752ff423c3e87fa0c32e8e94a1bbc10c8651fd2c9aaf50b3eef1010bf45358
SHA512d5ee4b7d639418c4e49a4b3fa467bccf1bd2a8dff25ff454342cdfe4c9f113035c9f04d8b241c5e26d4d20fe018c0d7a5690849875eecdf2d3651d40ab0cd1cf
-
Filesize
134KB
MD5877f3c2ed396dc2ddc70484f057e761a
SHA13850d6dbd0cdede7869c72a2cbcb425c7d02e439
SHA2562ca93561abf8da57dc23cd6d107e8c806d5cf42769fd2e2327befe34c58ae5aa
SHA51240a8cdd99aeb6bb2a75d1c1f1868181b8f5e2cd36f49421f0023e0f3bb5878666468b0c9d7ce61816cebe066d063f7b61d84650d02eb0a0a49a4fd38878c4890