Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 01:36
Behavioral task
behavioral1
Sample
c546daa6b3345e7144690000adda9783_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c546daa6b3345e7144690000adda9783_JaffaCakes118.exe
-
Size
63KB
-
MD5
c546daa6b3345e7144690000adda9783
-
SHA1
8e895ef5b4d40ad81d2af815c2f801bf0a90e84f
-
SHA256
0747ab87d632ad73f25b7a5e714402e65957476e01d151c0979bbff69235a5b3
-
SHA512
38d65bf278a56dc284a611978adb1e2278dec4960f37a87b3ab0d4bd527bdeffb3d9802edb05f45ec6a8b62780fe3def3a1feb492fdac24ee6427fa8a1dfb696
-
SSDEEP
1536:9d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:1dseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1196 omsecor.exe 3196 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c546daa6b3345e7144690000adda9783_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5016 wrote to memory of 1196 5016 c546daa6b3345e7144690000adda9783_JaffaCakes118.exe 83 PID 5016 wrote to memory of 1196 5016 c546daa6b3345e7144690000adda9783_JaffaCakes118.exe 83 PID 5016 wrote to memory of 1196 5016 c546daa6b3345e7144690000adda9783_JaffaCakes118.exe 83 PID 1196 wrote to memory of 3196 1196 omsecor.exe 102 PID 1196 wrote to memory of 3196 1196 omsecor.exe 102 PID 1196 wrote to memory of 3196 1196 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c546daa6b3345e7144690000adda9783_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c546daa6b3345e7144690000adda9783_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3196
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD56ae3b2f9a3ded27aaffc5bf038063f82
SHA1efcf725cf0154a8a382a0633c6a56f6636f1bd4f
SHA256d77aacd76727ab697a539cbe3aa88b5f928df6feaa1e7517e75c31f1ad2cee35
SHA51221695c4d52e65fe880412cd9bb76df4bc10871431a34debfa8648fe42736c3143d4c9f94b61754ee9867fde4465c332e19de2a6fbef7204d29fc2fe5f93b9d3c
-
Filesize
63KB
MD540972bd9ec54020a4d8264869ed5451a
SHA11ec914b2f3d894ac8041647d6921cc736372d269
SHA256b285d8471544462f71981edf5873c2abb578b821e4b549d4faa0c08634248492
SHA512b98d92402c2ffa83e78506d848e449c90b692098c24fb08581813120941341b89e8e621abd2e51f91891340e1d41f5fee16024210eb1ae927ca3494a6a5a5198