Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe
Resource
win7-20240704-en
General
-
Target
afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe
-
Size
96KB
-
MD5
d5a9e370628ca8008e1193bf8f314160
-
SHA1
73f85117c4a3bd2903ae46e7081add3479fb15ae
-
SHA256
afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641
-
SHA512
8108563002fe522ed6e308c0562d940304263d237d5561f8c1be59ea82aabc838ce3a3c9e827abe1f13f9315a121645c710480f10784094b2a1d746c25ba1b3b
-
SSDEEP
1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:jGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 4920 omsecor.exe 4124 omsecor.exe 640 omsecor.exe 4460 omsecor.exe 4404 omsecor.exe 3384 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3940 set thread context of 4276 3940 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 82 PID 4920 set thread context of 4124 4920 omsecor.exe 87 PID 640 set thread context of 4460 640 omsecor.exe 100 PID 4404 set thread context of 3384 4404 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 856 3940 WerFault.exe 81 524 4920 WerFault.exe 85 452 640 WerFault.exe 99 5076 4404 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4276 3940 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 82 PID 3940 wrote to memory of 4276 3940 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 82 PID 3940 wrote to memory of 4276 3940 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 82 PID 3940 wrote to memory of 4276 3940 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 82 PID 3940 wrote to memory of 4276 3940 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 82 PID 4276 wrote to memory of 4920 4276 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 85 PID 4276 wrote to memory of 4920 4276 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 85 PID 4276 wrote to memory of 4920 4276 afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe 85 PID 4920 wrote to memory of 4124 4920 omsecor.exe 87 PID 4920 wrote to memory of 4124 4920 omsecor.exe 87 PID 4920 wrote to memory of 4124 4920 omsecor.exe 87 PID 4920 wrote to memory of 4124 4920 omsecor.exe 87 PID 4920 wrote to memory of 4124 4920 omsecor.exe 87 PID 4124 wrote to memory of 640 4124 omsecor.exe 99 PID 4124 wrote to memory of 640 4124 omsecor.exe 99 PID 4124 wrote to memory of 640 4124 omsecor.exe 99 PID 640 wrote to memory of 4460 640 omsecor.exe 100 PID 640 wrote to memory of 4460 640 omsecor.exe 100 PID 640 wrote to memory of 4460 640 omsecor.exe 100 PID 640 wrote to memory of 4460 640 omsecor.exe 100 PID 640 wrote to memory of 4460 640 omsecor.exe 100 PID 4460 wrote to memory of 4404 4460 omsecor.exe 102 PID 4460 wrote to memory of 4404 4460 omsecor.exe 102 PID 4460 wrote to memory of 4404 4460 omsecor.exe 102 PID 4404 wrote to memory of 3384 4404 omsecor.exe 104 PID 4404 wrote to memory of 3384 4404 omsecor.exe 104 PID 4404 wrote to memory of 3384 4404 omsecor.exe 104 PID 4404 wrote to memory of 3384 4404 omsecor.exe 104 PID 4404 wrote to memory of 3384 4404 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe"C:\Users\Admin\AppData\Local\Temp\afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exeC:\Users\Admin\AppData\Local\Temp\afab42024bd75b37513c3fe61e5797836dbf6a67ae97b461d1606c90bd4b4641N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 2568⤵
- Program crash
PID:5076
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 2926⤵
- Program crash
PID:452
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 2284⤵
- Program crash
PID:524
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 2562⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3940 -ip 39401⤵PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4920 -ip 49201⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 640 -ip 6401⤵PID:4228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4404 -ip 44041⤵PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59121d0fdac102261685aadb3a23c4b12
SHA186d461f7e82f912776dda401a3141ea6d7047a7d
SHA25675c1aae9999c5e3bffec6627dd64b954160489e0e6a23f81a7a74b70eae1116d
SHA512b41c005fb7ec5f91ad32507f15bc025c5904407fddacecc66177638b7ad534590a6f2aa447cec614389caf18e7be576c822fed2b795faabc8ecffe1cb7a51c1a
-
Filesize
96KB
MD586aa26b6a1a08cf74acf7c29e1de5fee
SHA1598af807a31a2557969bd6784607d624c6bded11
SHA2568ef4c3c08dbe1fe8ef0c71be72fbcfd86c1d14222a0d16cb1ad361b419dc8074
SHA5122dd78538c77ffd209ba0cbe006ababaf934e3668163ab9be49fd3c17d0132cf10b3d31100922c1b1715a2db08cef7c5362c2f3065e930b50dd331fa154da8c68
-
Filesize
96KB
MD5c8f8c2b0277dbd551a35d771d92fcaf3
SHA17ad5d9ef6a5ec17487bff3ad385a97ee021746be
SHA256d4749b421ff6e15510213146747ab8f5dea6fe86a2882356bb86156da41080ab
SHA51244dde416909d4c87f56b548b4ac3ad32e7208309db1652f3e54e48837f27c3a080ad1349b3cfbdb27822273797cb30aa2c6de716fbc57eb78d35bf83a047c22a