Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 03:06
Behavioral task
behavioral1
Sample
JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe
-
Size
3.2MB
-
MD5
87d31d88399faf096dde6c4a8e496d47
-
SHA1
2d703789c6c4bb14fab288be135a2d7a37f35b28
-
SHA256
2c99d3578394a65038d337854898f2457dc1e8dbc60d72718ca877e211ad7a36
-
SHA512
f75b53ca5d7e430604b2521fe4dccf0bc3f5576a76a46d6d4d4f6a931a9da89eebc763a9f7e252fe6167fd764cd0bba5e01c5d865593e9e06b42e23fcb9b09bf
-
SSDEEP
24576:0OsfW+/6oTFwh3Qh3YZrxEu8CL7W2Y7TjtWDlp5DB:V6W+TFq6IZj8N2Y7T5GF
Malware Config
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2972 omsecor.exe 2328 omsecor.exe 300 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1720 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 1720 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 2972 omsecor.exe 2972 omsecor.exe 2328 omsecor.exe 2328 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2972 1720 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 30 PID 1720 wrote to memory of 2972 1720 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 30 PID 1720 wrote to memory of 2972 1720 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 30 PID 1720 wrote to memory of 2972 1720 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 30 PID 2972 wrote to memory of 2328 2972 omsecor.exe 33 PID 2972 wrote to memory of 2328 2972 omsecor.exe 33 PID 2972 wrote to memory of 2328 2972 omsecor.exe 33 PID 2972 wrote to memory of 2328 2972 omsecor.exe 33 PID 2328 wrote to memory of 300 2328 omsecor.exe 34 PID 2328 wrote to memory of 300 2328 omsecor.exe 34 PID 2328 wrote to memory of 300 2328 omsecor.exe 34 PID 2328 wrote to memory of 300 2328 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:300
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD566e4cf733fcd3d93e1b75c4a56ee4863
SHA19333beb68df3787ecd7aa42ad2c4d58155ec03b9
SHA2560569b73e6434855c64e5d529168a0e316b08d8ec924e36391bde48aafd3ce58e
SHA5121723e92f9900148181c16a420dd6c21312ba145ba708fcc3bafacb5fd1addb003f34fbed1dfbb41371676273c3bac9744a0184d835bd6dc255ba20360975f309
-
Filesize
3.2MB
MD502263993f58b91a0c47456eb60ce9925
SHA1ed3e49b4bf0ddd0b807952c6674a53f6f8699097
SHA25618ada68bc0b6fa5765506f409d35cf7a23f22ca4c486c51004e3b06cb2646e78
SHA512636ae03960059e889615ac3c7ca5abf5a735d90d5118b4df88f8841951381440db8fa68cd1dcb2e8baa4eca5374a2731c91cefc985b1bde0920fb75811bf2c85
-
Filesize
3.2MB
MD5384f483b7d6614ab1123826240d37bc5
SHA17637e5d5d6d69866e2d49a58c081af500568ec90
SHA256d1b1e029a625d4318a99c61cb975550b572a6e00e63cab7b2a1ae4631e0af553
SHA5124ed069ea837f675f4efd663b2fbcbcd030af5272f935568bcb06bbafdca50200e0c44e9d6b54cc5d0e1005faf7757236dcbb6976a35ea44ff9e2455ccf7b85ce