Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 16:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe
Resource
win7-20240903-en
General
-
Target
f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe
-
Size
134KB
-
MD5
5cf128e2139b580fd6b33ea1efa43ae0
-
SHA1
8ce6f2b0ead61caca11efdd3b7d4ce7dbb04c636
-
SHA256
f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4
-
SHA512
c6cebabac412e9c6c3edf31aba092a72c5100ec95f2c772dc3c10dd258de1ac93103280b6ed91ac94b0fb07f0abec3fbd05cb2614f5a1f73616e2face399d224
-
SSDEEP
1536:+DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:giRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2688 omsecor.exe 1352 omsecor.exe 2600 omsecor.exe 1904 omsecor.exe 1924 omsecor.exe 1524 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2660 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 2660 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 2688 omsecor.exe 1352 omsecor.exe 1352 omsecor.exe 1904 omsecor.exe 1904 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2216 set thread context of 2660 2216 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 30 PID 2688 set thread context of 1352 2688 omsecor.exe 32 PID 2600 set thread context of 1904 2600 omsecor.exe 36 PID 1924 set thread context of 1524 1924 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2660 2216 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 30 PID 2216 wrote to memory of 2660 2216 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 30 PID 2216 wrote to memory of 2660 2216 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 30 PID 2216 wrote to memory of 2660 2216 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 30 PID 2216 wrote to memory of 2660 2216 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 30 PID 2216 wrote to memory of 2660 2216 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 30 PID 2660 wrote to memory of 2688 2660 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 31 PID 2660 wrote to memory of 2688 2660 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 31 PID 2660 wrote to memory of 2688 2660 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 31 PID 2660 wrote to memory of 2688 2660 f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe 31 PID 2688 wrote to memory of 1352 2688 omsecor.exe 32 PID 2688 wrote to memory of 1352 2688 omsecor.exe 32 PID 2688 wrote to memory of 1352 2688 omsecor.exe 32 PID 2688 wrote to memory of 1352 2688 omsecor.exe 32 PID 2688 wrote to memory of 1352 2688 omsecor.exe 32 PID 2688 wrote to memory of 1352 2688 omsecor.exe 32 PID 1352 wrote to memory of 2600 1352 omsecor.exe 35 PID 1352 wrote to memory of 2600 1352 omsecor.exe 35 PID 1352 wrote to memory of 2600 1352 omsecor.exe 35 PID 1352 wrote to memory of 2600 1352 omsecor.exe 35 PID 2600 wrote to memory of 1904 2600 omsecor.exe 36 PID 2600 wrote to memory of 1904 2600 omsecor.exe 36 PID 2600 wrote to memory of 1904 2600 omsecor.exe 36 PID 2600 wrote to memory of 1904 2600 omsecor.exe 36 PID 2600 wrote to memory of 1904 2600 omsecor.exe 36 PID 2600 wrote to memory of 1904 2600 omsecor.exe 36 PID 1904 wrote to memory of 1924 1904 omsecor.exe 37 PID 1904 wrote to memory of 1924 1904 omsecor.exe 37 PID 1904 wrote to memory of 1924 1904 omsecor.exe 37 PID 1904 wrote to memory of 1924 1904 omsecor.exe 37 PID 1924 wrote to memory of 1524 1924 omsecor.exe 38 PID 1924 wrote to memory of 1524 1924 omsecor.exe 38 PID 1924 wrote to memory of 1524 1924 omsecor.exe 38 PID 1924 wrote to memory of 1524 1924 omsecor.exe 38 PID 1924 wrote to memory of 1524 1924 omsecor.exe 38 PID 1924 wrote to memory of 1524 1924 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe"C:\Users\Admin\AppData\Local\Temp\f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exeC:\Users\Admin\AppData\Local\Temp\f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
-
-
-
-
Network
-
Remote address:8.8.8.8:53Requestlousta.netIN AResponselousta.netIN A193.166.255.171
-
Remote address:193.166.255.171:80RequestGET /945/59.html HTTP/1.1
From: 133726186574028000
Via: bjledplYpdq;6+3]^mc`;4Yn`m_l8//+./.0]jq<1/0,\j`w<\a0a3aad62040b5\b/a1a.5c-27`b40`
Host: lousta.net
Connection: Keep-Alive
-
Remote address:8.8.8.8:53Requestmkkuei4kdsz.comIN AResponsemkkuei4kdsz.comIN A3.33.243.145mkkuei4kdsz.comIN A15.197.204.56
-
Remote address:3.33.243.145:80RequestGET /806/632.html HTTP/1.1
From: 133726186574028000
Via: bjledplYpdq;6+3]^mc`;4Yn`m_l8//+./.0]jq<1/0,\j`w<\a0a3aad62040b5\b/a1a.5c-27`b40`
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Sat, 05 Oct 2024 16:18:40 GMT
Content-Type: text/html
Content-Length: 114
Connection: keep-alive
-
Remote address:8.8.8.8:53Requestow5dirasuek.comIN AResponseow5dirasuek.comIN A52.34.198.229
-
Remote address:52.34.198.229:80RequestGET /863/729.html HTTP/1.1
From: 133726186574028000
Via: bjledplYpdq;6+3]^mc`;4Yn`m_l8//+./.0]jq<1/0,\j`w<\a0a3aad62040b5\b/a1a.5c-27`b40`
Host: ow5dirasuek.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Sat, 05 Oct 2024 16:18:51 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=afebf5c4b33a4f4ec0f50dc98e7f83d1|138.199.29.44|1728145131|1728145131|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=138.199.29.44; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
323 B 132 B 3 3
HTTP Request
GET http://lousta.net/945/59.html -
152 B 3
-
152 B 3
-
427 B 690 B 5 4
HTTP Request
GET http://mkkuei4kdsz.com/806/632.htmlHTTP Response
200 -
421 B 621 B 5 5
HTTP Request
GET http://ow5dirasuek.com/863/729.htmlHTTP Response
200 -
152 B 3
-
104 B 2
-
56 B 72 B 1 1
DNS Request
lousta.net
DNS Response
193.166.255.171
-
61 B 93 B 1 1
DNS Request
mkkuei4kdsz.com
DNS Response
3.33.243.14515.197.204.56
-
61 B 77 B 1 1
DNS Request
ow5dirasuek.com
DNS Response
52.34.198.229
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5828a5448e352a307c1bd8cd0cf84380d
SHA1855c2f625af2b77ecb30ddcf649200cfe0a6de67
SHA256779a27f95728e26e69f84ea44f809b779d6f3f6cb65bcf1313bd34d543b9f2a7
SHA5124d270e8183bd8cfd06dc1bd2d6c15f6b502ec8df8fb6ee9c671e3eaf9337c9729a0f202b89242a51b76fb6c24c360e194a59ff2f5fc712088018eec326dda1a4
-
Filesize
134KB
MD5293301a2006a710602549247f16b8b19
SHA153302ee922849b490722bc7af8c3624749a19b2a
SHA25606a92952733e3df28a4994d3650fd2a97273c6665e722be147f96ac819fe4381
SHA51297a3702361a4b3b2c023d68ef1d02a448768d92a5eaf8de3b62af76067cc777b16dc493c4b749d38998377f54a52332f1bf45a3482200f847948b44662d10d09
-
Filesize
134KB
MD566d03123f1da017afc56e7fc134e8c80
SHA16936dedd4c546d512ee9bfc19fae88f730aa787b
SHA256504d960265ed313c8f0b1b00e7ca9d51cdbbe10aa57a621cb912d1edf2253a47
SHA5129be633950351fd24831396669fcb9605d448f4c3d3b80ae08b2d64841a45d5ec5f1095cde540afa4b3af27a12bf64b34d545d1d4e20b69f05e7e37d921d31d39