Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe
Resource
win7-20240704-en
General
-
Target
afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe
-
Size
96KB
-
MD5
d5a9e370628ca8008e1193bf8f314160
-
SHA1
73f85117c4a3bd2903ae46e7081add3479fb15ae
-
SHA256
afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641
-
SHA512
8108563002fe522ed6e308c0562d940304263d237d5561f8c1be59ea82aabc838ce3a3c9e827abe1f13f9315a121645c710480f10784094b2a1d746c25ba1b3b
-
SSDEEP
1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:jGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2352 omsecor.exe 1924 omsecor.exe 1984 omsecor.exe 2984 omsecor.exe 1544 omsecor.exe 2260 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2948 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 2948 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 2352 omsecor.exe 1924 omsecor.exe 1924 omsecor.exe 2984 omsecor.exe 2984 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2172 set thread context of 2948 2172 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 30 PID 2352 set thread context of 1924 2352 omsecor.exe 32 PID 1984 set thread context of 2984 1984 omsecor.exe 36 PID 1544 set thread context of 2260 1544 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2948 2172 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 30 PID 2172 wrote to memory of 2948 2172 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 30 PID 2172 wrote to memory of 2948 2172 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 30 PID 2172 wrote to memory of 2948 2172 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 30 PID 2172 wrote to memory of 2948 2172 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 30 PID 2172 wrote to memory of 2948 2172 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 30 PID 2948 wrote to memory of 2352 2948 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 31 PID 2948 wrote to memory of 2352 2948 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 31 PID 2948 wrote to memory of 2352 2948 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 31 PID 2948 wrote to memory of 2352 2948 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 31 PID 2352 wrote to memory of 1924 2352 omsecor.exe 32 PID 2352 wrote to memory of 1924 2352 omsecor.exe 32 PID 2352 wrote to memory of 1924 2352 omsecor.exe 32 PID 2352 wrote to memory of 1924 2352 omsecor.exe 32 PID 2352 wrote to memory of 1924 2352 omsecor.exe 32 PID 2352 wrote to memory of 1924 2352 omsecor.exe 32 PID 1924 wrote to memory of 1984 1924 omsecor.exe 35 PID 1924 wrote to memory of 1984 1924 omsecor.exe 35 PID 1924 wrote to memory of 1984 1924 omsecor.exe 35 PID 1924 wrote to memory of 1984 1924 omsecor.exe 35 PID 1984 wrote to memory of 2984 1984 omsecor.exe 36 PID 1984 wrote to memory of 2984 1984 omsecor.exe 36 PID 1984 wrote to memory of 2984 1984 omsecor.exe 36 PID 1984 wrote to memory of 2984 1984 omsecor.exe 36 PID 1984 wrote to memory of 2984 1984 omsecor.exe 36 PID 1984 wrote to memory of 2984 1984 omsecor.exe 36 PID 2984 wrote to memory of 1544 2984 omsecor.exe 37 PID 2984 wrote to memory of 1544 2984 omsecor.exe 37 PID 2984 wrote to memory of 1544 2984 omsecor.exe 37 PID 2984 wrote to memory of 1544 2984 omsecor.exe 37 PID 1544 wrote to memory of 2260 1544 omsecor.exe 38 PID 1544 wrote to memory of 2260 1544 omsecor.exe 38 PID 1544 wrote to memory of 2260 1544 omsecor.exe 38 PID 1544 wrote to memory of 2260 1544 omsecor.exe 38 PID 1544 wrote to memory of 2260 1544 omsecor.exe 38 PID 1544 wrote to memory of 2260 1544 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe"C:\Users\Admin\AppData\Local\Temp\afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exeC:\Users\Admin\AppData\Local\Temp\afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD586aa26b6a1a08cf74acf7c29e1de5fee
SHA1598af807a31a2557969bd6784607d624c6bded11
SHA2568ef4c3c08dbe1fe8ef0c71be72fbcfd86c1d14222a0d16cb1ad361b419dc8074
SHA5122dd78538c77ffd209ba0cbe006ababaf934e3668163ab9be49fd3c17d0132cf10b3d31100922c1b1715a2db08cef7c5362c2f3065e930b50dd331fa154da8c68
-
Filesize
96KB
MD579cc021be71e1ee2df18cb1c6fe24153
SHA15db722a929dc815489fe42e322d6c1c6c1ba6b3d
SHA256f010a54cd97d0f412cdfce18e0e1350bfe077c8bfe462d4ff2c1f1404c0c0e7e
SHA512f738288b7197b4b483fefff50871b212d6dccddbb283bfe947df53de361c5b5a8e47c4d02fff89c343cfa3b3612fa7d99bf8450f325b5d35b4f11d77a5ac960b
-
Filesize
96KB
MD5d05c654b7a8ffccc445151f423885047
SHA1d10a2c9e1f3609bb8d136d28c11c49c79414c706
SHA2566ff490d347fe034e00bd95c761961f43365a6b0f63dfc26668db6334586ecf34
SHA51244b09436a13cbb8f67a437e59852d04bc083e29db2f2d5d1b8b5eb10ef5e37e2bda2cb540d96ba8385eb032dc5140372c9099014f1790acf40ae0adf318a403d