Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
7b8000f9c01a420e8bbe8764221b88a0N.exe
Resource
win7-20240903-en
General
-
Target
7b8000f9c01a420e8bbe8764221b88a0N.exe
-
Size
96KB
-
MD5
7b8000f9c01a420e8bbe8764221b88a0
-
SHA1
240e672471aceb45b4fd9a0d9a2f0cb8db994323
-
SHA256
46f9c033ee6db48d111dde50b68ac790ae0b201954bc1501e30a7f70f4597a3a
-
SHA512
58706788e8e445cd8914d63b4ad3002b30c246d4313c97768360fc3767c80c5dc49abfe5849ac695b91aafac59586af6598bcf73d8606b6969810a2a5ba3c33b
-
SSDEEP
1536:dnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:dGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1512 omsecor.exe 2776 omsecor.exe 5024 omsecor.exe 3828 omsecor.exe 2260 omsecor.exe 2164 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3052 set thread context of 3428 3052 7b8000f9c01a420e8bbe8764221b88a0N.exe 84 PID 1512 set thread context of 2776 1512 omsecor.exe 89 PID 5024 set thread context of 3828 5024 omsecor.exe 106 PID 2260 set thread context of 2164 2260 omsecor.exe 109 -
Program crash 4 IoCs
pid pid_target Process procid_target 4848 3052 WerFault.exe 83 2924 1512 WerFault.exe 86 2264 5024 WerFault.exe 105 4736 2260 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b8000f9c01a420e8bbe8764221b88a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b8000f9c01a420e8bbe8764221b88a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3428 3052 7b8000f9c01a420e8bbe8764221b88a0N.exe 84 PID 3052 wrote to memory of 3428 3052 7b8000f9c01a420e8bbe8764221b88a0N.exe 84 PID 3052 wrote to memory of 3428 3052 7b8000f9c01a420e8bbe8764221b88a0N.exe 84 PID 3052 wrote to memory of 3428 3052 7b8000f9c01a420e8bbe8764221b88a0N.exe 84 PID 3052 wrote to memory of 3428 3052 7b8000f9c01a420e8bbe8764221b88a0N.exe 84 PID 3428 wrote to memory of 1512 3428 7b8000f9c01a420e8bbe8764221b88a0N.exe 86 PID 3428 wrote to memory of 1512 3428 7b8000f9c01a420e8bbe8764221b88a0N.exe 86 PID 3428 wrote to memory of 1512 3428 7b8000f9c01a420e8bbe8764221b88a0N.exe 86 PID 1512 wrote to memory of 2776 1512 omsecor.exe 89 PID 1512 wrote to memory of 2776 1512 omsecor.exe 89 PID 1512 wrote to memory of 2776 1512 omsecor.exe 89 PID 1512 wrote to memory of 2776 1512 omsecor.exe 89 PID 1512 wrote to memory of 2776 1512 omsecor.exe 89 PID 2776 wrote to memory of 5024 2776 omsecor.exe 105 PID 2776 wrote to memory of 5024 2776 omsecor.exe 105 PID 2776 wrote to memory of 5024 2776 omsecor.exe 105 PID 5024 wrote to memory of 3828 5024 omsecor.exe 106 PID 5024 wrote to memory of 3828 5024 omsecor.exe 106 PID 5024 wrote to memory of 3828 5024 omsecor.exe 106 PID 5024 wrote to memory of 3828 5024 omsecor.exe 106 PID 5024 wrote to memory of 3828 5024 omsecor.exe 106 PID 3828 wrote to memory of 2260 3828 omsecor.exe 108 PID 3828 wrote to memory of 2260 3828 omsecor.exe 108 PID 3828 wrote to memory of 2260 3828 omsecor.exe 108 PID 2260 wrote to memory of 2164 2260 omsecor.exe 109 PID 2260 wrote to memory of 2164 2260 omsecor.exe 109 PID 2260 wrote to memory of 2164 2260 omsecor.exe 109 PID 2260 wrote to memory of 2164 2260 omsecor.exe 109 PID 2260 wrote to memory of 2164 2260 omsecor.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b8000f9c01a420e8bbe8764221b88a0N.exe"C:\Users\Admin\AppData\Local\Temp\7b8000f9c01a420e8bbe8764221b88a0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\7b8000f9c01a420e8bbe8764221b88a0N.exeC:\Users\Admin\AppData\Local\Temp\7b8000f9c01a420e8bbe8764221b88a0N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 2688⤵
- Program crash
PID:4736
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 2926⤵
- Program crash
PID:2264
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 2884⤵
- Program crash
PID:2924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 2922⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3052 -ip 30521⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1512 -ip 15121⤵PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5024 -ip 50241⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2260 -ip 22601⤵PID:636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59ea832e607c08cbb345d856861b13363
SHA16331c630b7feba01f2fb2b4b10039b91a25c0b24
SHA2568d8baf84a013800444c6867c526707ef3fd3902a3fe4d535b6a24bae49c572de
SHA5123f237af4a20a6ebd730c55a02c43575d8405b2b6dcf405bd46944c1582354be518256d9535aff13e5e6811fc87b719d2164d3b99c86065c27c1c34920ee089f7
-
Filesize
96KB
MD5a79b7af97a011e7a11c9fd66593bcd8f
SHA1583f277858345e5d0c9ea112c7ccccf402a2c4eb
SHA256ecaaae649f6dcb9398e214c2ae4b7966406d2323db6bbd12194003a0c851f92d
SHA512cb3ae471b70e68aa2dc2f5247f305aa0413ada5f80b1b3ae54c5221f7fc118f9f4c8caf17ccc1b1c3bcae224fe0a0a00848db0dd3b5cd965eedf01173f3adf23
-
Filesize
96KB
MD5c3ee08815d038bb5d55520b9689c2e95
SHA1734e97492dcdb082dc2d8f7ca0dedcf4639e3bef
SHA256d78ddcb59522bcfb398dcdf8935bae72372579b8f16c8426316a6f908d45a1d1
SHA512d95140d50f8318150594e4985ca3595644ebf2e3c2a9b1c09ce705524ba7b762ccb9a54a4393a19d9b029f7d88d03050bd444542063411861868cd6c69e0fff6