Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 20:35
Behavioral task
behavioral1
Sample
JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe
-
Size
68KB
-
MD5
d1c0397f95c70d883635c76d911a9d34
-
SHA1
a38db2e6e202fcc2e518ab10bc469bee5c188257
-
SHA256
5d8f6b81dfd784dcf6cf046790c49f5450fd94179a47b79bca98f70b991a0278
-
SHA512
9c2d990971ae034c69283a76933b35e4f93e32df5e5d885af8dd1e534974005c65af85482799bb6aa65e1afc0e03abec02c1c1273805e17f66cd8ea7a1fe0d71
-
SSDEEP
768:5MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:5bIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2404 omsecor.exe 1792 omsecor.exe 1224 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1704 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 1704 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 2404 omsecor.exe 2404 omsecor.exe 1792 omsecor.exe 1792 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2404 1704 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 30 PID 1704 wrote to memory of 2404 1704 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 30 PID 1704 wrote to memory of 2404 1704 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 30 PID 1704 wrote to memory of 2404 1704 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 30 PID 2404 wrote to memory of 1792 2404 omsecor.exe 33 PID 2404 wrote to memory of 1792 2404 omsecor.exe 33 PID 2404 wrote to memory of 1792 2404 omsecor.exe 33 PID 2404 wrote to memory of 1792 2404 omsecor.exe 33 PID 1792 wrote to memory of 1224 1792 omsecor.exe 34 PID 1792 wrote to memory of 1224 1792 omsecor.exe 34 PID 1792 wrote to memory of 1224 1792 omsecor.exe 34 PID 1792 wrote to memory of 1224 1792 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1224
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5c99b6b58f27735c8fd06ecce7dffd029
SHA1bbd74f4e877fd149006be112823cf47e06f8348c
SHA2564bcd9058a25b2c69e46ccd2455f1e0f8df0f86147996086d94f1330e8ff3e5cd
SHA5123408603fc5acd076af622b21ede0fe7178cedc628819d7232ad18427039457c575a1767c1c94e4348206fa8ece912b7ff64b5e2dfb910cf8c2cb8d5aae429a60
-
Filesize
68KB
MD57f86ccfd9beee3f3aab42c09d974aa8e
SHA1cf112ceba34535e4d7d85a5a9f29a780ea48716d
SHA256805ac85a677aefdb135992f5ace9d975d34f808b2dcf885633ba796f5e8fec5a
SHA51289ff304f0ba7ed20cd5ca28a21419d16b21fb4511ba6c52767aa6e93271f17e38af617e1b89b4a561443a5aade135f22f0fd6a5eb2e38e4c6f9f57e72d506064
-
Filesize
68KB
MD587779ef1161deb677d806d1a426b51fb
SHA1d41e04768d8090016a164da2ee62054c6b882242
SHA2569438f3290b4af3b35a76affe6138691ebc67ea63f8514d4204c4e7448ff1465c
SHA5123cc59910d04ed68d7e469710fe0e4ae6fa3856ceb9a656c1aadaa42d67e5ff72f0626eb5f64699585511e5b4c5fbdb944133547edd4ecdaab7d47ef565c2580a