Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 22:37
Behavioral task
behavioral1
Sample
00a315aaac97173b5fe64ad100cb4e50N.exe
Resource
win7-20240729-en
General
-
Target
00a315aaac97173b5fe64ad100cb4e50N.exe
-
Size
35KB
-
MD5
00a315aaac97173b5fe64ad100cb4e50
-
SHA1
e921047c84a3b220d49977e77774c2d23fa28513
-
SHA256
4c9b7dfdee5be1f7f0a9cf8f956356b714af56ea4d0be0d68fbddbbbd1d45b83
-
SHA512
1ef40587b1142e5a112847e4517703e1f9a50a1c672902fb3d0c34fc8bcf39724c80bf78c4180209a3ac458a526c288ffb95a4087f58b991bf39e679547d3366
-
SSDEEP
768:j6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:e8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 896 omsecor.exe 1452 omsecor.exe -
resource yara_rule behavioral2/memory/1124-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/896-5-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1124-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x00090000000233ed-4.dat upx behavioral2/memory/896-8-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/896-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/896-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/896-15-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000c000000021a6e-18.dat upx behavioral2/memory/1452-19-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/896-22-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1452-23-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00a315aaac97173b5fe64ad100cb4e50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1124 wrote to memory of 896 1124 00a315aaac97173b5fe64ad100cb4e50N.exe 83 PID 1124 wrote to memory of 896 1124 00a315aaac97173b5fe64ad100cb4e50N.exe 83 PID 1124 wrote to memory of 896 1124 00a315aaac97173b5fe64ad100cb4e50N.exe 83 PID 896 wrote to memory of 1452 896 omsecor.exe 97 PID 896 wrote to memory of 1452 896 omsecor.exe 97 PID 896 wrote to memory of 1452 896 omsecor.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\00a315aaac97173b5fe64ad100cb4e50N.exe"C:\Users\Admin\AppData\Local\Temp\00a315aaac97173b5fe64ad100cb4e50N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD56f3b7e99495037e649d56b3dc2caa544
SHA1f7f77af41d722fa0ebb16c7349f268dac5466014
SHA25603bddd16e186ae253d3e89363c8e5f0aa3fee3bad5499908d06d7316186e3753
SHA51256f03a4ef0174c754d3e1411ac8dbef9e442caf5d34afa9f2161146e0ed5fa48392321cd0fe46dac86576ae47533eb124808666c853af799ee3638f73a1db3bb
-
Filesize
35KB
MD515ead224227a015ab61818d94126543f
SHA1cfd84dafde4ddcf843352ae820abbc185a23d0e5
SHA256b83b94c1185f596dc7ab2ff2d616ee98bb7b392b3c00b58b4fbcaf81a13124a2
SHA512548d81e8dd00fd8e17216747fbc9adc8f75a93163f6492d1cfcccb2a0ecae85eea5351b1be8037910ad687eeb5441bd3625bcccb98dd452130803fa66480cb4e