Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 01:40
Behavioral task
behavioral1
Sample
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe
Resource
win7-20240903-en
General
-
Target
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe
-
Size
80KB
-
MD5
a18df377b1afe9e98cef42387cfc8760
-
SHA1
168bd8b5c5a2d59776167993c69c13d75cb78a8e
-
SHA256
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1
-
SHA512
f198a3e07d4294a9f7447a657780a6f0ad25123804492064fc3ad352b4b595da28ebd5b2ae5d7e3c9f34e92fe60b1a12ae56308f8caf7f653dc1a333c6f53ca9
-
SSDEEP
768:jfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:jfbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
omsecor.exeomsecor.exepid process 4156 omsecor.exe 2288 omsecor.exe -
Drops file in System32 directory 2 IoCs
Processes:
omsecor.exeomsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exeomsecor.exeomsecor.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exeomsecor.exedescription pid process target process PID 3624 wrote to memory of 4156 3624 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe omsecor.exe PID 3624 wrote to memory of 4156 3624 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe omsecor.exe PID 3624 wrote to memory of 4156 3624 97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe omsecor.exe PID 4156 wrote to memory of 2288 4156 omsecor.exe omsecor.exe PID 4156 wrote to memory of 2288 4156 omsecor.exe omsecor.exe PID 4156 wrote to memory of 2288 4156 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe"C:\Users\Admin\AppData\Local\Temp\97292122b779b6ed6155a18294fc252db155411ae01e51e38f4f7c027cf606f1N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD543b2d799b2ab43084a5d2f3336ee3b5b
SHA1b35d029b7ab1e5f24b833f59c154a4327f161399
SHA256bcdcdf0d280918d7a259bde3bf5195656619be48089b4d0e4a3c406a3aadd795
SHA512bdd173eafa016389e2b3717c118b349cdc25a62f9e6fd0e900e2ebe841f043600a0260a57854478db6563cf40e11f1980d096611990f0a8a846368acd26910ff
-
Filesize
80KB
MD58e26f55db8fcdf0abf04afba4b2c0d38
SHA19a7918262c78d3ba7c94d5458f83ce7e82ea0dbc
SHA256bbc16c3ecf7bb09186cf29e808e36527004c125be363282540b700b0bf902e09
SHA512e88f7ba3ccfcefb0a1e93f4045ae29a3cf8ecc7501aed0fdb35a1740b5177672479aa66625f3894f5ade5423724521aaee7f81f683558436b85aefd84b9cd519