Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 09:37
Behavioral task
behavioral1
Sample
a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe
Resource
win7-20240903-en
General
-
Target
a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe
-
Size
80KB
-
MD5
c77e0cf5e41715c8650cbb8d06e53990
-
SHA1
4e7ba72dfe19df224cf851dee970c322b0c7ecdb
-
SHA256
a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8
-
SHA512
57a085dca23dbb09bb744b302ae6f02f0653479d0ef6762af318ad8e4504dc384fd84d32712a105866da5893a52b8e5a885ac28e7904f8130583a9103d5d14e0
-
SSDEEP
768:rfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:rfbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2296 omsecor.exe 2996 omsecor.exe 2036 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2296 4052 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 84 PID 4052 wrote to memory of 2296 4052 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 84 PID 4052 wrote to memory of 2296 4052 a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe 84 PID 2296 wrote to memory of 2996 2296 omsecor.exe 99 PID 2296 wrote to memory of 2996 2296 omsecor.exe 99 PID 2296 wrote to memory of 2996 2296 omsecor.exe 99 PID 2996 wrote to memory of 2036 2996 omsecor.exe 100 PID 2996 wrote to memory of 2036 2996 omsecor.exe 100 PID 2996 wrote to memory of 2036 2996 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe"C:\Users\Admin\AppData\Local\Temp\a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55d621c96c3e7bb846b1d0cbd6c9fd4a8
SHA1bf2c291e44f9b26d03a696ee6c2a7bd30705439b
SHA25683292a72d52621ec084378be454a2d9662323e545b9f49f977d96359bbfcb001
SHA51254e82ccd61e34f89bbdce3483817fb159c00ea86cf9f1aac4f417a48633a88ba63c1990196e9aaa97ca7b19d0f73b28ebbf61cd7dc25776b30fcfe4c35db43f8
-
Filesize
80KB
MD5c77e0cf5e41715c8650cbb8d06e53990
SHA14e7ba72dfe19df224cf851dee970c322b0c7ecdb
SHA256a04f610843209d7fa14f996ec7bb8eac9217c8e2c37f594b192e69a93e1426f8
SHA51257a085dca23dbb09bb744b302ae6f02f0653479d0ef6762af318ad8e4504dc384fd84d32712a105866da5893a52b8e5a885ac28e7904f8130583a9103d5d14e0