Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 03:06
Behavioral task
behavioral1
Sample
JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe
-
Size
3.2MB
-
MD5
87d31d88399faf096dde6c4a8e496d47
-
SHA1
2d703789c6c4bb14fab288be135a2d7a37f35b28
-
SHA256
2c99d3578394a65038d337854898f2457dc1e8dbc60d72718ca877e211ad7a36
-
SHA512
f75b53ca5d7e430604b2521fe4dccf0bc3f5576a76a46d6d4d4f6a931a9da89eebc763a9f7e252fe6167fd764cd0bba5e01c5d865593e9e06b42e23fcb9b09bf
-
SSDEEP
24576:0OsfW+/6oTFwh3Qh3YZrxEu8CL7W2Y7TjtWDlp5DB:V6W+TFq6IZj8N2Y7T5GF
Malware Config
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4728 omsecor.exe 2576 omsecor.exe 3484 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3272 wrote to memory of 4728 3272 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 83 PID 3272 wrote to memory of 4728 3272 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 83 PID 3272 wrote to memory of 4728 3272 JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe 83 PID 4728 wrote to memory of 2576 4728 omsecor.exe 101 PID 4728 wrote to memory of 2576 4728 omsecor.exe 101 PID 4728 wrote to memory of 2576 4728 omsecor.exe 101 PID 2576 wrote to memory of 3484 2576 omsecor.exe 102 PID 2576 wrote to memory of 3484 2576 omsecor.exe 102 PID 2576 wrote to memory of 3484 2576 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_87d31d88399faf096dde6c4a8e496d47.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3484
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD566e4cf733fcd3d93e1b75c4a56ee4863
SHA19333beb68df3787ecd7aa42ad2c4d58155ec03b9
SHA2560569b73e6434855c64e5d529168a0e316b08d8ec924e36391bde48aafd3ce58e
SHA5121723e92f9900148181c16a420dd6c21312ba145ba708fcc3bafacb5fd1addb003f34fbed1dfbb41371676273c3bac9744a0184d835bd6dc255ba20360975f309
-
Filesize
3.2MB
MD51077a035c51761f010237ecd24e3c955
SHA1b885dd1859415f2bb4e5c23baa83ac8bad6385b8
SHA256828259939db4c13c7a430a6bdd89c263fc31512d9f041e062e325813f46166bf
SHA5123bc9c6a67af2363a0664d4c2cb141d0e442478369d51f439c3d113ce594b4dad949ebd509e2a0dd14ac43244bb17901f4e9d41c61c9ef36aa27f12e640c496a7
-
Filesize
3.2MB
MD54cffd9170ec22398f8122b354c2b753a
SHA1abf26bc34fa7caae5242f3f19d605d1ef86710ef
SHA2563967af2a070187a2d90977067622ae5960dc47a2a8c5e443a5577af25747bd32
SHA512aad911dca99d60bab2f8e0e3a9d65beb54feffa8b234b30ef899f460a8e78db745cafb4e187e6ff07e0eb32d4619e215e8ed25ac4c87cd8f116050ac46cf92df