Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 04:18
Behavioral task
behavioral1
Sample
77abc33ac719c9524c70618a0288a5c0N.exe
Resource
win7-20240903-en
General
-
Target
77abc33ac719c9524c70618a0288a5c0N.exe
-
Size
35KB
-
MD5
77abc33ac719c9524c70618a0288a5c0
-
SHA1
1d2915a6b18b24e89f72b82a9465390dc101a362
-
SHA256
d5ed867b43849cb147111867cb56ac2bbf060c2ce41e2b9209da1bb296e04c47
-
SHA512
b2d7fd291a1a503a560e2e64ce2fe690e697311acecc60692397dac64c06972f76b1704018f322672ca91b148ff0d5fd114eeedfabc88cc7b3b5278b35cd68ba
-
SSDEEP
768:h6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:s8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1840 omsecor.exe 2824 omsecor.exe -
resource yara_rule behavioral2/memory/2040-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000800000002346c-3.dat upx behavioral2/memory/1840-4-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2040-5-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1840-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1840-10-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1840-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1840-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000c000000021a4a-17.dat upx behavioral2/memory/2824-18-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1840-21-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2824-22-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 77abc33ac719c9524c70618a0288a5c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1840 2040 77abc33ac719c9524c70618a0288a5c0N.exe 83 PID 2040 wrote to memory of 1840 2040 77abc33ac719c9524c70618a0288a5c0N.exe 83 PID 2040 wrote to memory of 1840 2040 77abc33ac719c9524c70618a0288a5c0N.exe 83 PID 1840 wrote to memory of 2824 1840 omsecor.exe 97 PID 1840 wrote to memory of 2824 1840 omsecor.exe 97 PID 1840 wrote to memory of 2824 1840 omsecor.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\77abc33ac719c9524c70618a0288a5c0N.exe"C:\Users\Admin\AppData\Local\Temp\77abc33ac719c9524c70618a0288a5c0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD51fc1b34c57dc76f7a62d034a3104a246
SHA148c81c30da674c9e0a3951340395f58b874c9189
SHA256851706afb8a53f70aee74f29924241ed5eafe5c691e6260eecf598b41d16d352
SHA512b8c7db882474c2f6ee41f0d6835de6328d22cac2151e569bcac0a30965e78dc739e6aa99f0b2a37ba882029007f38de3ff583c3e58b87fdb5701762731ecfdae
-
Filesize
35KB
MD5a29ef3553ecb134b6d2d0633bd3f235f
SHA12b175d29a1b5bf81b584fa692410c32c117f428d
SHA2569d19f65bafe1c2fce2c29da5a3959480ec55e95da8cc77a795941ec46af6f0e3
SHA512bff809ccd22296d6baa2f62b0bda761e8337b058f83c362500b1b99f6825ccd3caa0f6e5f2c80b975353c2e3838dc382d099f6c00949129c8a4d21429fecc27e