Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31/12/2024, 16:34
Behavioral task
behavioral1
Sample
JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe
-
Size
4.5MB
-
MD5
28867a2af3f4c42a66c63bd16404e801
-
SHA1
8e1bfb09703a0606f6852d12c0cf765d45e1cf2f
-
SHA256
1402d55ebe79764aa6b500d90065bfe6cac3be6e4b121d503aade48ba3beab58
-
SHA512
2d6e929894a2156be074fa055ba0062323a6ed0dd4ae513f1fe4a0666b8fd91181dd6d9f38a8f3c0eb9550433c9d7bede553f73f0a032b3c3dbfa5e7c9c11c73
-
SSDEEP
24576:29Z9yn0hTZrIbAEu8CkB7mA5yupIIKQS9YRXT8HU/ny5U5DB:QKnuTZh8JUUyJCS9CXT8Enys
Malware Config
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1300 omsecor.exe 2992 omsecor.exe 1984 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2368 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 2368 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 1300 omsecor.exe 1300 omsecor.exe 2992 omsecor.exe 2992 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1300 2368 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 30 PID 2368 wrote to memory of 1300 2368 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 30 PID 2368 wrote to memory of 1300 2368 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 30 PID 2368 wrote to memory of 1300 2368 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 30 PID 1300 wrote to memory of 2992 1300 omsecor.exe 33 PID 1300 wrote to memory of 2992 1300 omsecor.exe 33 PID 1300 wrote to memory of 2992 1300 omsecor.exe 33 PID 1300 wrote to memory of 2992 1300 omsecor.exe 33 PID 2992 wrote to memory of 1984 2992 omsecor.exe 34 PID 2992 wrote to memory of 1984 2992 omsecor.exe 34 PID 2992 wrote to memory of 1984 2992 omsecor.exe 34 PID 2992 wrote to memory of 1984 2992 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD5bb166f2e5141214baf2ff26f4dd7002b
SHA17519e5f63c1e5a73ab06345dc06c3a9782b26427
SHA25611c6f34f46d95c9a7b10908b4207dbfee208767d1d02c555a6acaa57718d8028
SHA5123cb4667a266fc70fb5d038eaf21da62de4b83cb48f912084bad527c9bfe72e54ec0d740cba5f81a62ba2a3b504f2e840a8d26c4e98b51f0cc72a0bd9beca52c3
-
Filesize
4.5MB
MD5c6cbac1499123622169830323ce22532
SHA1840c3fb3eda965c1074396207cf7aa0a52b14267
SHA2560ef41fd14ae125d096724caa8a639dbce88af32e604a69b7b531a6cfedffa6fc
SHA5129620564b08053cf38e1553d2709929269e06e05d92774c8d7f5899098e7491ba808306798b8a3456ef13bf2201761c4132a30869956519b0fcd00b206bbc37e5
-
Filesize
4.5MB
MD5b7861986490f0adcea7720ce9ba80c82
SHA176af0fb6bd9bbcfe70fdfd6a0e5e13a4c2aee0e1
SHA2560e0c95d186779d23b18b3fc65073b8544d6e92283896d34a25b57cbf35b39418
SHA512a87f48ad92b5be01178dca33c6e615e74506f10fa48720a3329d6f87f621c447b17b7fe98fd3976f2699229c56fb805d9a80733a0cdd4811b3eeacfbf443a415