Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 01:40
Behavioral task
behavioral1
Sample
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe
Resource
win7-20240903-en
General
-
Target
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe
-
Size
80KB
-
MD5
a18df377b1afe9e98cef42387cfc8760
-
SHA1
168bd8b5c5a2d59776167993c69c13d75cb78a8e
-
SHA256
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1
-
SHA512
f198a3e07d4294a9f7447a657780a6f0ad25123804492064fc3ad352b4b595da28ebd5b2ae5d7e3c9f34e92fe60b1a12ae56308f8caf7f653dc1a333c6f53ca9
-
SSDEEP
768:jfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:jfbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 2112 omsecor.exe 2536 omsecor.exe 632 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exeomsecor.exeomsecor.exepid process 2828 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe 2828 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe 2112 omsecor.exe 2112 omsecor.exe 2536 omsecor.exe 2536 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
omsecor.exeomsecor.exe97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exeomsecor.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exeomsecor.exeomsecor.exedescription pid process target process PID 2828 wrote to memory of 2112 2828 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe omsecor.exe PID 2828 wrote to memory of 2112 2828 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe omsecor.exe PID 2828 wrote to memory of 2112 2828 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe omsecor.exe PID 2828 wrote to memory of 2112 2828 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe omsecor.exe PID 2112 wrote to memory of 2536 2112 omsecor.exe omsecor.exe PID 2112 wrote to memory of 2536 2112 omsecor.exe omsecor.exe PID 2112 wrote to memory of 2536 2112 omsecor.exe omsecor.exe PID 2112 wrote to memory of 2536 2112 omsecor.exe omsecor.exe PID 2536 wrote to memory of 632 2536 omsecor.exe omsecor.exe PID 2536 wrote to memory of 632 2536 omsecor.exe omsecor.exe PID 2536 wrote to memory of 632 2536 omsecor.exe omsecor.exe PID 2536 wrote to memory of 632 2536 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe"C:\Users\Admin\AppData\Local\Temp\97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:632
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD543b2d799b2ab43084a5d2f3336ee3b5b
SHA1b35d029b7ab1e5f24b833f59c154a4327f161399
SHA256bcdcdf0d280918d7a259bde3bf5195656619be48089b4d0e4a3c406a3aadd795
SHA512bdd173eafa016389e2b3717c118b349cdc25a62f9e6fd0e900e2ebe841f043600a0260a57854478db6563cf40e11f1980d096611990f0a8a846368acd26910ff
-
Filesize
80KB
MD5bd5eac3054ef0212082fd139ef556d71
SHA1c0122b099f524ebd1145389b2af5c4dc77beb98d
SHA2567b459d133cc30da2e8af2173fb8cc1f208ef1b7c2e819543024d0a7497db7a1e
SHA512ba42a17e8c54ea1c2a88a0112a7d0943dc00cc2123fc12a9be555933caf1d1c040fc40a2ca82bc18e95f1e52f15b940692ba6b8f1e98cbf1d478506060575e5c
-
Filesize
80KB
MD5ebcb5acd7aa2b84146ea749cf3626799
SHA1bc1626c3e36c7b1ce81f30a9f113da3576d87156
SHA256ad57c704c5b74ae3ac14e3921fd95db36f64aa13e5d50ea45ae2b025b97e4ab5
SHA512c2e730ffc0e70c1c842ff3249a88b096ac1110b95fe7ca3922a0024edb89f92f2a0ced0f043b9dce32ad71f5f51b6c5f3834c689132e76e404809bfa6f08b8a9