Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 18:10
Behavioral task
behavioral1
Sample
JaffaCakes118_32c86669e13130f626559270d700b220.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_32c86669e13130f626559270d700b220.exe
-
Size
64KB
-
MD5
32c86669e13130f626559270d700b220
-
SHA1
e34bb4ee888e90fc93ccf17de7a94b3e2e0a5c10
-
SHA256
516ee6f6a9ca8ea6b3107077c120a92713ce464971d821df7d30f202c7ad5790
-
SHA512
e8be616e4c26fe1c2b57d659b744dec71e49ef15ec4dc9952c0b4b2de0afaadd4d2f17ebfb7e5068a60e5c508ef373bfcca9e7ebd8aedbebe0741b8d90a8b0fc
-
SSDEEP
1536:Ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:8dseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2568 omsecor.exe 2684 omsecor.exe 1432 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2500 JaffaCakes118_32c86669e13130f626559270d700b220.exe 2500 JaffaCakes118_32c86669e13130f626559270d700b220.exe 2568 omsecor.exe 2568 omsecor.exe 2684 omsecor.exe 2684 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_32c86669e13130f626559270d700b220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2568 2500 JaffaCakes118_32c86669e13130f626559270d700b220.exe 30 PID 2500 wrote to memory of 2568 2500 JaffaCakes118_32c86669e13130f626559270d700b220.exe 30 PID 2500 wrote to memory of 2568 2500 JaffaCakes118_32c86669e13130f626559270d700b220.exe 30 PID 2500 wrote to memory of 2568 2500 JaffaCakes118_32c86669e13130f626559270d700b220.exe 30 PID 2568 wrote to memory of 2684 2568 omsecor.exe 33 PID 2568 wrote to memory of 2684 2568 omsecor.exe 33 PID 2568 wrote to memory of 2684 2568 omsecor.exe 33 PID 2568 wrote to memory of 2684 2568 omsecor.exe 33 PID 2684 wrote to memory of 1432 2684 omsecor.exe 34 PID 2684 wrote to memory of 1432 2684 omsecor.exe 34 PID 2684 wrote to memory of 1432 2684 omsecor.exe 34 PID 2684 wrote to memory of 1432 2684 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_32c86669e13130f626559270d700b220.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_32c86669e13130f626559270d700b220.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fdb45b9d3667b7c84b82171a120ba653
SHA16c12d2ff59f3217e7dea2db31b92f743eb89c83f
SHA256886b946f4b66246c11b0b674be79853283ebcdc9cf6fdb31887c86c335ebc822
SHA512d628118acc36154d3c914f0ddd4a2b745a640785fdeb21a417e4c2e390d0a402a2d29f932a674b9347e7ab84b0ab9fd596d018c8a635a3c236c0d125570e2d29
-
Filesize
64KB
MD5ee88969320d1fdfa9f4f19cf37941ca4
SHA18a2bb091a8880482b27a58dd251403c0706282f6
SHA2569e2f6aaa482005ef7562407f4dcd1184b993115a4582a22e2b5169caba7f59b7
SHA512709949bd86369977dc1bb2a997e2b1bb9a5e259dbfd51147a92cfa6dccfc22bd4560db86aaf292295db9c9df76dceba5d6c6d1e9b54795eefec232bad999db05
-
Filesize
64KB
MD5b9660ee4fbff231fb784cede0f998a36
SHA15cc1e886e590345d6d357f8b4b4a5946e786616e
SHA2560de8bfed6691f70344714cc10ec974d4992a3ed9022ff8cfc860bbf40988b668
SHA5123ac9f6f7dfe1eef17683a13e27133e226ac02593450262a94d75295b7f610380457ca1bfc244b5547aaac3ce19546ec44e48ea50c0b6efdb694e9e9751be42f7