Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 16:34
Behavioral task
behavioral1
Sample
JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe
-
Size
4.5MB
-
MD5
28867a2af3f4c42a66c63bd16404e801
-
SHA1
8e1bfb09703a0606f6852d12c0cf765d45e1cf2f
-
SHA256
1402d55ebe79764aa6b500d90065bfe6cac3be6e4b121d503aade48ba3beab58
-
SHA512
2d6e929894a2156be074fa055ba0062323a6ed0dd4ae513f1fe4a0666b8fd91181dd6d9f38a8f3c0eb9550433c9d7bede553f73f0a032b3c3dbfa5e7c9c11c73
-
SSDEEP
24576:29Z9yn0hTZrIbAEu8CkB7mA5yupIIKQS9YRXT8HU/ny5U5DB:QKnuTZh8JUUyJCS9CXT8Enys
Malware Config
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1372 omsecor.exe 4176 omsecor.exe 3096 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4200 wrote to memory of 1372 4200 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 83 PID 4200 wrote to memory of 1372 4200 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 83 PID 4200 wrote to memory of 1372 4200 JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe 83 PID 1372 wrote to memory of 4176 1372 omsecor.exe 100 PID 1372 wrote to memory of 4176 1372 omsecor.exe 100 PID 1372 wrote to memory of 4176 1372 omsecor.exe 100 PID 4176 wrote to memory of 3096 4176 omsecor.exe 101 PID 4176 wrote to memory of 3096 4176 omsecor.exe 101 PID 4176 wrote to memory of 3096 4176 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_28867a2af3f4c42a66c63bd16404e801.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD50bd04ef6e12b8a2cee1d8c7b7f899f07
SHA1b6692cab95df67f1ee862a01c0173cc7ba7ce72a
SHA25668cac04ae8512e0a5a05c1578db4962fd7ec9c87dffd799e93126577f9e4c098
SHA5126ac2e7dd64d1ae4b302bd72b2838ad818387f1b19ef38faf8207f7febe96f4ad2df374531689101f930356692f1c677ad5e35c5df3e7b86baa9ae6a26a7b5bd5
-
Filesize
4.5MB
MD5bb166f2e5141214baf2ff26f4dd7002b
SHA17519e5f63c1e5a73ab06345dc06c3a9782b26427
SHA25611c6f34f46d95c9a7b10908b4207dbfee208767d1d02c555a6acaa57718d8028
SHA5123cb4667a266fc70fb5d038eaf21da62de4b83cb48f912084bad527c9bfe72e54ec0d740cba5f81a62ba2a3b504f2e840a8d26c4e98b51f0cc72a0bd9beca52c3
-
Filesize
4.5MB
MD5f20b733899dd4e1a8a0c8e7a65e39835
SHA11e4690cc2e0a1b2bc325469430a2a09a5a053082
SHA256a8a1eea225d4937d3133de5bfc885c507000a715638e0524c72ab5903475a16e
SHA512f60ad21b87376f58514b77a52089a16f3a42ac4ce38804ff26df256bb2828af917cfe34c088d4a57793d5052d37e76f0a8500ea3c7db27985e95ba26a38adf19