Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
99ecb0667b31dd2dbf401a85b2ad5440N.exe
Resource
win7-20240705-en
General
-
Target
99ecb0667b31dd2dbf401a85b2ad5440N.exe
-
Size
134KB
-
MD5
99ecb0667b31dd2dbf401a85b2ad5440
-
SHA1
fe0836ce7dfad63df6432accf0d41a2ed7d6f9a9
-
SHA256
6e24d85b4fff6dfca63a2205260102f6f12c04975049be318098e0230bd466ff
-
SHA512
295286dc7b628c04b0aab59bc31cfa8b39b28eb063dbd31f5cb39c6f7011d1aa676066fae57ff2bb8985c6d6342fb6c56e1a6cc8e24a4dd2ef1984919086d439
-
SSDEEP
1536:SDfDbhERTatPLTH0NqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwC7M:EiRTeH0NqAW6J6f1tqF6dngNmaZC7M
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4744 omsecor.exe 4548 omsecor.exe 1228 omsecor.exe 3504 omsecor.exe 652 omsecor.exe 716 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2324 set thread context of 4908 2324 99ecb0667b31dd2dbf401a85b2ad5440N.exe 84 PID 4744 set thread context of 4548 4744 omsecor.exe 88 PID 1228 set thread context of 3504 1228 omsecor.exe 117 PID 652 set thread context of 716 652 omsecor.exe 121 -
Program crash 4 IoCs
pid pid_target Process procid_target 3628 4744 WerFault.exe 86 1396 2324 WerFault.exe 83 3888 1228 WerFault.exe 116 1028 652 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99ecb0667b31dd2dbf401a85b2ad5440N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99ecb0667b31dd2dbf401a85b2ad5440N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4908 2324 99ecb0667b31dd2dbf401a85b2ad5440N.exe 84 PID 2324 wrote to memory of 4908 2324 99ecb0667b31dd2dbf401a85b2ad5440N.exe 84 PID 2324 wrote to memory of 4908 2324 99ecb0667b31dd2dbf401a85b2ad5440N.exe 84 PID 2324 wrote to memory of 4908 2324 99ecb0667b31dd2dbf401a85b2ad5440N.exe 84 PID 2324 wrote to memory of 4908 2324 99ecb0667b31dd2dbf401a85b2ad5440N.exe 84 PID 4908 wrote to memory of 4744 4908 99ecb0667b31dd2dbf401a85b2ad5440N.exe 86 PID 4908 wrote to memory of 4744 4908 99ecb0667b31dd2dbf401a85b2ad5440N.exe 86 PID 4908 wrote to memory of 4744 4908 99ecb0667b31dd2dbf401a85b2ad5440N.exe 86 PID 4744 wrote to memory of 4548 4744 omsecor.exe 88 PID 4744 wrote to memory of 4548 4744 omsecor.exe 88 PID 4744 wrote to memory of 4548 4744 omsecor.exe 88 PID 4744 wrote to memory of 4548 4744 omsecor.exe 88 PID 4744 wrote to memory of 4548 4744 omsecor.exe 88 PID 4548 wrote to memory of 1228 4548 omsecor.exe 116 PID 4548 wrote to memory of 1228 4548 omsecor.exe 116 PID 4548 wrote to memory of 1228 4548 omsecor.exe 116 PID 1228 wrote to memory of 3504 1228 omsecor.exe 117 PID 1228 wrote to memory of 3504 1228 omsecor.exe 117 PID 1228 wrote to memory of 3504 1228 omsecor.exe 117 PID 1228 wrote to memory of 3504 1228 omsecor.exe 117 PID 1228 wrote to memory of 3504 1228 omsecor.exe 117 PID 3504 wrote to memory of 652 3504 omsecor.exe 119 PID 3504 wrote to memory of 652 3504 omsecor.exe 119 PID 3504 wrote to memory of 652 3504 omsecor.exe 119 PID 652 wrote to memory of 716 652 omsecor.exe 121 PID 652 wrote to memory of 716 652 omsecor.exe 121 PID 652 wrote to memory of 716 652 omsecor.exe 121 PID 652 wrote to memory of 716 652 omsecor.exe 121 PID 652 wrote to memory of 716 652 omsecor.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\99ecb0667b31dd2dbf401a85b2ad5440N.exe"C:\Users\Admin\AppData\Local\Temp\99ecb0667b31dd2dbf401a85b2ad5440N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\99ecb0667b31dd2dbf401a85b2ad5440N.exeC:\Users\Admin\AppData\Local\Temp\99ecb0667b31dd2dbf401a85b2ad5440N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 2568⤵
- Program crash
PID:1028
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 2926⤵
- Program crash
PID:3888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 3004⤵
- Program crash
PID:3628
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 2882⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2324 -ip 23241⤵PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4744 -ip 47441⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1228 -ip 12281⤵PID:4044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 652 -ip 6521⤵PID:400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5376f81bc28b275bf13c1ed498970d139
SHA1fa58e8a7b11b7d45415307664dc3222ecf8ab798
SHA256caf8baf7873bfefd06f5903a7478d48e7b2167b6bcb43af744cf89cb3c3ec82a
SHA512877491b5851e449e7ae8fbc52da648f6e1b08fba0a36d587f31d7ba6c1cff74657488c55e3918cc98b374a0c8d2750146d737a8a8f9006a9ff6e2d7441481c44
-
Filesize
134KB
MD5c228a506ef49c2938a43775b52f536c6
SHA1959c6c250d5962c6de80b22c3989a0960b8c6064
SHA256afe7c7213e6cc1a2e1cd657efd5d49f56779aad6a52ec2d6c89653657cd97232
SHA512d5f8266d54ebe413f338c3b220aebb2ffb9d188bcff152c61fe7b35e3d83e44a6c3587e86eb9f6ac61b1f7cf3c16e49dd339e0462208b5f5c5dad4c5fe4063a4
-
Filesize
134KB
MD51e213e7bf59e50b82f9df6cf6c3fe65e
SHA159ebcaad03dec533da93ddfdd47de138f62e0059
SHA256e5d6245f1146a873ffa2088ec0f0f288c6eff68e3b557db3ff85f214676b9c89
SHA512772bc5f3584239d0de420d8036829d5dcedb9db58c4afe4a2ccc63528cc18bd30ac59fbdfc9b90533d1015181894b681f649327a2207002971a26be4e7d6462b