Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 09:37
Behavioral task
behavioral1
Sample
a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe
Resource
win7-20240903-en
General
-
Target
a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe
-
Size
80KB
-
MD5
c77e0cf5e41715c8650cbb8d06e53990
-
SHA1
4e7ba72dfe19df224cf851dee970c322b0c7ecdb
-
SHA256
a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8
-
SHA512
57a085dca23dbb09bb744b302ae6f02f0653479d0ef6762af318ad8e4504dc384fd84d32712a105866da5893a52b8e5a885ac28e7904f8130583a9103d5d14e0
-
SSDEEP
768:rfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:rfbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1284 omsecor.exe 676 omsecor.exe 2840 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1716 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 1716 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 1284 omsecor.exe 1284 omsecor.exe 676 omsecor.exe 676 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1284 1716 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 30 PID 1716 wrote to memory of 1284 1716 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 30 PID 1716 wrote to memory of 1284 1716 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 30 PID 1716 wrote to memory of 1284 1716 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 30 PID 1284 wrote to memory of 676 1284 omsecor.exe 33 PID 1284 wrote to memory of 676 1284 omsecor.exe 33 PID 1284 wrote to memory of 676 1284 omsecor.exe 33 PID 1284 wrote to memory of 676 1284 omsecor.exe 33 PID 676 wrote to memory of 2840 676 omsecor.exe 34 PID 676 wrote to memory of 2840 676 omsecor.exe 34 PID 676 wrote to memory of 2840 676 omsecor.exe 34 PID 676 wrote to memory of 2840 676 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe"C:\Users\Admin\AppData\Local\Temp\a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55d621c96c3e7bb846b1d0cbd6c9fd4a8
SHA1bf2c291e44f9b26d03a696ee6c2a7bd30705439b
SHA25683292a72d52621ec084378be454a2d9662323e545b9f49f977d96359bbfcb001
SHA51254e82ccd61e34f89bbdce3483817fb159c00ea86cf9f1aac4f417a48633a88ba63c1990196e9aaa97ca7b19d0f73b28ebbf61cd7dc25776b30fcfe4c35db43f8
-
Filesize
80KB
MD56d4e62cad59ec8f2b707f44182bf1afd
SHA1731b70fc6023af287194c81695385a8b0395bc47
SHA256d5b5741e52de3e9041aa43169bcb47706b4c59058e9b22e2c4d09557af9979f1
SHA512658a8d98c69b37f972ca4786abf0ebc1abd40cdd5d70e1911dd73e9eafe6e0b64edd84a4d3f954dbead3e30872793be0f5701a26f62379a3b152a4b1f53590b3
-
Filesize
80KB
MD520e709b666080bafa02ca25473d83286
SHA1353f692f6a837a39acaa6faab8785539fd4ec8bb
SHA256a11b4794499f76aa57eef6ccf46832cb6739cd60dae53f0ee768c18f59fe1f8b
SHA512625c4aa77ee51960efdcc0d418e1ba3d346bc142c017b3a3fc1a6b7731cbd9d1402234c1b58e2efe95eca1fdb8b4e5287f2aff7765cc5f92e6dd40818ba29137