Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 12:04
Behavioral task
behavioral1
Sample
JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe
-
Size
63KB
-
MD5
22a3021cfd10e58e6fec8510d90b190a
-
SHA1
2f49a1e983bc3368b328863e1dedd14f1a7e8a18
-
SHA256
122b29021457b3e0a3f3f3c470bb3d26b02d744212526134880f09faa96ae67c
-
SHA512
cc2197a69c8cd07524aca2d47ca181c987d420cc33406f56b2d4d3f30bb7deec68a1d2843b848a7569372435449510a6eddb4878b9489f955a5e9f1e8cfb7c76
-
SSDEEP
1536:+d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:mdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2744 omsecor.exe 1172 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4588 wrote to memory of 2744 4588 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 82 PID 4588 wrote to memory of 2744 4588 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 82 PID 4588 wrote to memory of 2744 4588 JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe 82 PID 2744 wrote to memory of 1172 2744 omsecor.exe 92 PID 2744 wrote to memory of 1172 2744 omsecor.exe 92 PID 2744 wrote to memory of 1172 2744 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_22a3021cfd10e58e6fec8510d90b190a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD599599548be0267e79293acf2cd361ee9
SHA146c40b63702b4712d0f048402c838688a6d4acd8
SHA25636c9a80755e357e5806824d8dd50a2773d7081f8475fb431dde25514d604d419
SHA51270dc17d2fb28ad3d9fd18b3f279330f9a23de2501bf196a4e42a8b4f6f6161699977e8e21278bd3e90bf37feb09eedb644ffe85aa468e3154aeb3f0df39afc2a
-
Filesize
63KB
MD56c7728b866e1647566b1dc5310dda994
SHA1d3b252804fcef279ad30c57bd000cead59f2f893
SHA25619183585d7c49a2c3b2e41e9d52d05a79d3559e146a7b11da9f99b01f9289951
SHA5128649dddf8b9ab09b1cb8bf7ddc158cceeee2e86f8e036a3b6c9feaa6a122009adef618888e44b2536732224e1452b0336f337fbbbc6bf3dc76123ec6feed0b52