Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe
Resource
win7-20240903-en
General
-
Target
aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe
-
Size
96KB
-
MD5
3e911300db137c18a5b7853a2925a87c
-
SHA1
89218a9dfc48b0b8287b380cafdee93976d682c4
-
SHA256
aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e
-
SHA512
906b7012caa1c6838fd575694a1655a2305216af273e08823b6760d93cdf264e02c3bb420599dc767c6f48a5528c9d692c193188d0f299bc1fc269c09b5c8e03
-
SSDEEP
1536:KnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:KGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2228 omsecor.exe 2336 omsecor.exe 1648 omsecor.exe 2812 omsecor.exe 800 omsecor.exe 1660 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 552 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 552 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 2228 omsecor.exe 2336 omsecor.exe 2336 omsecor.exe 2812 omsecor.exe 2812 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2532 set thread context of 552 2532 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 30 PID 2228 set thread context of 2336 2228 omsecor.exe 32 PID 1648 set thread context of 2812 1648 omsecor.exe 36 PID 800 set thread context of 1660 800 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2532 wrote to memory of 552 2532 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 30 PID 2532 wrote to memory of 552 2532 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 30 PID 2532 wrote to memory of 552 2532 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 30 PID 2532 wrote to memory of 552 2532 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 30 PID 2532 wrote to memory of 552 2532 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 30 PID 2532 wrote to memory of 552 2532 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 30 PID 552 wrote to memory of 2228 552 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 31 PID 552 wrote to memory of 2228 552 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 31 PID 552 wrote to memory of 2228 552 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 31 PID 552 wrote to memory of 2228 552 aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe 31 PID 2228 wrote to memory of 2336 2228 omsecor.exe 32 PID 2228 wrote to memory of 2336 2228 omsecor.exe 32 PID 2228 wrote to memory of 2336 2228 omsecor.exe 32 PID 2228 wrote to memory of 2336 2228 omsecor.exe 32 PID 2228 wrote to memory of 2336 2228 omsecor.exe 32 PID 2228 wrote to memory of 2336 2228 omsecor.exe 32 PID 2336 wrote to memory of 1648 2336 omsecor.exe 35 PID 2336 wrote to memory of 1648 2336 omsecor.exe 35 PID 2336 wrote to memory of 1648 2336 omsecor.exe 35 PID 2336 wrote to memory of 1648 2336 omsecor.exe 35 PID 1648 wrote to memory of 2812 1648 omsecor.exe 36 PID 1648 wrote to memory of 2812 1648 omsecor.exe 36 PID 1648 wrote to memory of 2812 1648 omsecor.exe 36 PID 1648 wrote to memory of 2812 1648 omsecor.exe 36 PID 1648 wrote to memory of 2812 1648 omsecor.exe 36 PID 1648 wrote to memory of 2812 1648 omsecor.exe 36 PID 2812 wrote to memory of 800 2812 omsecor.exe 37 PID 2812 wrote to memory of 800 2812 omsecor.exe 37 PID 2812 wrote to memory of 800 2812 omsecor.exe 37 PID 2812 wrote to memory of 800 2812 omsecor.exe 37 PID 800 wrote to memory of 1660 800 omsecor.exe 38 PID 800 wrote to memory of 1660 800 omsecor.exe 38 PID 800 wrote to memory of 1660 800 omsecor.exe 38 PID 800 wrote to memory of 1660 800 omsecor.exe 38 PID 800 wrote to memory of 1660 800 omsecor.exe 38 PID 800 wrote to memory of 1660 800 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe"C:\Users\Admin\AppData\Local\Temp\aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exeC:\Users\Admin\AppData\Local\Temp\aa6f2f5e1b955242b26b578f7ecd4a363cafa56c1f9e5d09adf2353d97666a1e.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1660
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5dbdb4cef28208bd5e35e265ef651fc0a
SHA1cb42450d57ccbca72bbad8a719456668b43a86b3
SHA2565f150257462a3809fc32221fbd18477d8524efcf6163c612e4b446ac5df23ba9
SHA51287e3fbf1cf6aaa818cf46738611547f25661f80455532d76cd074cb26a8d3ab11e5c64d763bf96a757ab1d55f7c7b28250cbdee7fb2f6579f30d5ae53831c2f4
-
Filesize
96KB
MD5b890d00346020e5e7d1be8c1da45f957
SHA1488ff389cb31a1e1731412495a2af332fb2a5d98
SHA256e3fb2360029258a50f3dd53eae2e8664128f5c037e30a09c4701bf8395e39aab
SHA5126a60c834a71d23cf46f7fc6b614e8e76de5cc5f745463abc65296d175eee84eaf960be9d2ce460437389892f90164f474f51a52188b7bab289a2775b28120dfb
-
Filesize
96KB
MD591e27cfeea6dc2a73f1b6b9cf75a60be
SHA13ed5f3f5b07a81c7f0de9a70998a18d16100ca4e
SHA2562a7ca9ff0fcda949358c56179b5e1d2d4b33d3e872fb583055d046b9f3bbdfd7
SHA5125b2697d5b14148f6410f84c2ce83981316f7ddf1aff070dbe5208436fe58c3866a510507062fd2c505e2b1bf0920b44ee7b3dcccf0b5ef241493c971a3adc277