Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:38
Behavioral task
behavioral1
Sample
c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041N.exe
Resource
win7-20240704-en
General
-
Target
c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041N.exe
-
Size
248KB
-
MD5
a60ebfe7854009ab2b5ec3af14e51300
-
SHA1
caa1cdc7908a51a7069aeb8aa37076ec7060a95d
-
SHA256
c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041
-
SHA512
28f91aa3eb563396aaa6eab950c89172fd9a7900ec3eb7c3e0d09780b74c28782968b1304e5afc342d926733c7d47df0ba411c4c83d2414fc173c42799b2e981
-
SSDEEP
1536:n4d9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZMnOHBRzU:nIdseIO+EZEyFjEOFqTiQmGnOHjzU
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1148 omsecor.exe 2352 omsecor.exe -
resource yara_rule behavioral2/memory/2704-0-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/files/0x00080000000235c4-3.dat upx behavioral2/memory/1148-4-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/2704-5-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/1148-7-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/files/0x0011000000020196-10.dat upx behavioral2/memory/2352-12-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/1148-13-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/2352-14-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2704 wrote to memory of 1148 2704 c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041N.exe 89 PID 2704 wrote to memory of 1148 2704 c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041N.exe 89 PID 2704 wrote to memory of 1148 2704 c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041N.exe 89 PID 1148 wrote to memory of 2352 1148 omsecor.exe 100 PID 1148 wrote to memory of 2352 1148 omsecor.exe 100 PID 1148 wrote to memory of 2352 1148 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041N.exe"C:\Users\Admin\AppData\Local\Temp\c93d0186b392999477f491b21279f48d1895927f014bc6390440e6faebe4d041N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2352
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4180,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4608 /prefetch:81⤵PID:2356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5aba803e5ca4be096f9ab3bd226e6966d
SHA149caffcf5db15c03c7251922b72b406eea37dd16
SHA256058536f211bb91a882325696d6df1c5dd632f067f0d3a0d8dd8c6802c61fe589
SHA512c156a350a0194d34a20de832e35d2a628a4217a38d0b3d09c3a2f99502bca4fc4fc2e779605f482a3e83d36c0bf33a4f726d985d2584d1bb9946818fe22a9640
-
Filesize
248KB
MD5296feb0246afbe9ec12f43621c531aac
SHA1b322c90ac005e8a28c07cef7089dc2f15b1c288e
SHA2566d5a69fbaee3dc1a6b64e0a779b0d764f3ec950a882116d1b4e95ab5f3c3fc3b
SHA5122caad9aac5ce1f5fc9bfbdbf456afa09815bcfa534778c0d670bf19f6fe9558305d7e3841ce0a763594ec4c81dd8eb15b6b33d0d1960c62b51f0d475b368fa54