Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 08:54
Behavioral task
behavioral1
Sample
a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe
Resource
win7-20240903-en
General
-
Target
a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe
-
Size
80KB
-
MD5
8dc48f261289e44e07a3a5659f7fd980
-
SHA1
bcae59b1d04c4304c50f951f6bde91282cbe34b4
-
SHA256
a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819b
-
SHA512
c0e45f1681e8074c79f2749928062bfae9687ae6e14c1fd05a3d32b7fe07cf20e44db4b7166427ca1df50a93302560cc1b6682c07a13d5ff2bdf28f61535e246
-
SSDEEP
1536:Kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzz:KdseIOMEZEyFjEOFqTiQmOl/5xPvw3
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2696 omsecor.exe 2880 omsecor.exe 1492 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2316 a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe 2316 a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe 2696 omsecor.exe 2696 omsecor.exe 2880 omsecor.exe 2880 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2696 2316 a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe 30 PID 2316 wrote to memory of 2696 2316 a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe 30 PID 2316 wrote to memory of 2696 2316 a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe 30 PID 2316 wrote to memory of 2696 2316 a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe 30 PID 2696 wrote to memory of 2880 2696 omsecor.exe 33 PID 2696 wrote to memory of 2880 2696 omsecor.exe 33 PID 2696 wrote to memory of 2880 2696 omsecor.exe 33 PID 2696 wrote to memory of 2880 2696 omsecor.exe 33 PID 2880 wrote to memory of 1492 2880 omsecor.exe 34 PID 2880 wrote to memory of 1492 2880 omsecor.exe 34 PID 2880 wrote to memory of 1492 2880 omsecor.exe 34 PID 2880 wrote to memory of 1492 2880 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe"C:\Users\Admin\AppData\Local\Temp\a55282530ff19db8033a37a792ede0df0713404276c46ab461cbd18c630f819bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5c640bf8c5d35e54a6a200e047b8ea51d
SHA1dbf63f55ab207e53681c5c2df701e1455c0d98a2
SHA25609576683f26b71e7c5fd931bead5a40d844f8e1b2a5758ce9bcd0e845876a50a
SHA512b1e97c59d9fc53c6e38364a8188a0b374ddb78f20fc2a8014d9ab3b054fdc5a4af6745152828a9c9c307cab1fc3259ebe69d1ff72935304c42c9c51b483c7149
-
Filesize
80KB
MD5d3bac987e73dab99105487ff8fce2cfb
SHA15ab3fec2e7e2056e9fe844c1e9c626dd04a145cf
SHA256b50c02edebdb0c9ef4aeb077fba695f590016490708c28792ef8a16ab85f502a
SHA5125db5944b406a25aa2114364c24977af566676ce1fb30a20da8f26bf26c098d712b7afc4044b1af529762e199e0700adbf12c0b09015394d0292938d41503391d
-
Filesize
80KB
MD52d976e4282d02fea1fa57e0b35963bf2
SHA1fa239218e04952c69d679a33e1a353c0bf8a4972
SHA2567214893b9088875db781c803732521008cb1cc7ab0b5354f11426e31461fb549
SHA512de7b301597314c071e4a5603d36085c4362c1ccd4eb55f15755c0f533ba1365cbb1c90fcb897a42484e4f29b23a27e19eb8e6e8eebb3e5c84e32a2842ac33570