Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 12:04
Behavioral task
behavioral1
Sample
JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe
-
Size
63KB
-
MD5
22a3021cfd10e58e6fec8510d90b190a
-
SHA1
2f49a1e983bc3368b328863e1dedd14f1a7e8a18
-
SHA256
122b29021457b3e0a3f3f3c470bb3d26b02d744212526134880f09faa96ae67c
-
SHA512
cc2197a69c8cd07524aca2d47ca181c987d420cc33406f56b2d4d3f30bb7deec68a1d2843b848a7569372435449510a6eddb4878b9489f955a5e9f1e8cfb7c76
-
SSDEEP
1536:+d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:mdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2076 omsecor.exe 2508 omsecor.exe 2972 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2412 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 2412 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 2076 omsecor.exe 2076 omsecor.exe 2508 omsecor.exe 2508 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2076 2412 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 28 PID 2412 wrote to memory of 2076 2412 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 28 PID 2412 wrote to memory of 2076 2412 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 28 PID 2412 wrote to memory of 2076 2412 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 28 PID 2076 wrote to memory of 2508 2076 omsecor.exe 32 PID 2076 wrote to memory of 2508 2076 omsecor.exe 32 PID 2076 wrote to memory of 2508 2076 omsecor.exe 32 PID 2076 wrote to memory of 2508 2076 omsecor.exe 32 PID 2508 wrote to memory of 2972 2508 omsecor.exe 33 PID 2508 wrote to memory of 2972 2508 omsecor.exe 33 PID 2508 wrote to memory of 2972 2508 omsecor.exe 33 PID 2508 wrote to memory of 2972 2508 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD599599548be0267e79293acf2cd361ee9
SHA146c40b63702b4712d0f048402c838688a6d4acd8
SHA25636c9a80755e357e5806824d8dd50a2773d7081f8475fb431dde25514d604d419
SHA51270dc17d2fb28ad3d9fd18b3f279330f9a23de2501bf196a4e42a8b4f6f6161699977e8e21278bd3e90bf37feb09eedb644ffe85aa468e3154aeb3f0df39afc2a
-
Filesize
63KB
MD5b48d778245939b9e853943dad7cfca05
SHA18e7c7b04bd8b3dfbf9cfb8c18df7e07de6cf9ece
SHA2566d12099332e543c081b68c24927edebcab8ca80e2574b58240df343bf18e618a
SHA512bdc4f3f5eeaeeba42684bb87abb10f88cb26394e1de729768ec48a4a9791d2aaca6457e179a1b2be74c53e245fade1551c0846ad3bceba0e9a7c820fb10be318
-
Filesize
63KB
MD558c3316b8d1f30c84e64beb747625756
SHA14000965e7c839455d80c0137c5a461aa921bdf21
SHA256430c23c44090b6668a264fa31cbb5f25566b6d5afbfdb6521f5c239acc1f56ac
SHA512d41cdcf47e050b7e84d67b18c4d76ca84571eb39a555314ce9a21f6aa34c0672404ec5136445c3a8eba9bb90b64cee98608fae1bf0c690b164086ff4415e71cb