Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 18:19
Behavioral task
behavioral1
Sample
JaffaCakes118_5fac49ff6aad7f6a8291851580bffe9b.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_5fac49ff6aad7f6a8291851580bffe9b.exe
-
Size
4.5MB
-
MD5
5fac49ff6aad7f6a8291851580bffe9b
-
SHA1
dfb3036a845cc2ddaa62d3566976b2656ba44725
-
SHA256
b855bce10c0efd4998e88e95f6bfa4a2f6088c7c5b1befadcff2bb2045f159c7
-
SHA512
25148871e7c04f25065194b0b227219f27a49eb91f0add5e58e5a8c6f6b0e5dbfcf53e439c297f7726e90ca4523930caa0ef74406c4b0dcf1461bb1302cad876
-
SSDEEP
24576:99Z9yn0hTZrIbAEu8CkB7mA5yupIIKQS9YRXT8HU/ny5U5DB:DKnuTZh8JUUyJCS9CXT8Enys
Malware Config
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4588 omsecor.exe 4068 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5fac49ff6aad7f6a8291851580bffe9b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1488 wrote to memory of 4588 1488 JaffaCakes118_5fac49ff6aad7f6a8291851580bffe9b.exe 83 PID 1488 wrote to memory of 4588 1488 JaffaCakes118_5fac49ff6aad7f6a8291851580bffe9b.exe 83 PID 1488 wrote to memory of 4588 1488 JaffaCakes118_5fac49ff6aad7f6a8291851580bffe9b.exe 83 PID 4588 wrote to memory of 4068 4588 omsecor.exe 100 PID 4588 wrote to memory of 4068 4588 omsecor.exe 100 PID 4588 wrote to memory of 4068 4588 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5fac49ff6aad7f6a8291851580bffe9b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5fac49ff6aad7f6a8291851580bffe9b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD56874cdda0a0ead79319c79be31da05f1
SHA10db244550a33fb4c7f4f1c8224d4bafb75ca92a4
SHA256a9f77caddb6101cc4211d0b1324c14b9e3c02970b125f1870d048ee4f94772b7
SHA5122ea3e3ddf2797c78994085f1238acb7c419cc5caa11ae5b83ccbd7e7adfae152682bab02dd52ad7391ca29d2c4744cca4c85740a9edc6f6d7c9e91a2d6b00353
-
Filesize
4.5MB
MD5a1a5ab9dd2869c7d5afc9912a3a644d3
SHA192aafd50ca717f858669bdfe73adb1c45aca011a
SHA256b814c4fde82f894b2833e5f2cec032d02b2fa36a15989cf6ee93715e72a78760
SHA512385648bc29391a6315bd5ed04bc22611066e442bbb55d056ab22b447e2251502b93d284dd9af723292b0d69b99084f8a6afa41bc591ab2253c68b2ff2f97a1d7