Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 20:35
Behavioral task
behavioral1
Sample
JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe
-
Size
68KB
-
MD5
d1c0397f95c70d883635c76d911a9d34
-
SHA1
a38db2e6e202fcc2e518ab10bc469bee5c188257
-
SHA256
5d8f6b81dfd784dcf6cf046790c49f5450fd94179a47b79bca98f70b991a0278
-
SHA512
9c2d990971ae034c69283a76933b35e4f93e32df5e5d885af8dd1e534974005c65af85482799bb6aa65e1afc0e03abec02c1c1273805e17f66cd8ea7a1fe0d71
-
SSDEEP
768:5MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:5bIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3976 omsecor.exe 4020 omsecor.exe 4940 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3352 wrote to memory of 3976 3352 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 83 PID 3352 wrote to memory of 3976 3352 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 83 PID 3352 wrote to memory of 3976 3352 JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe 83 PID 3976 wrote to memory of 4020 3976 omsecor.exe 99 PID 3976 wrote to memory of 4020 3976 omsecor.exe 99 PID 3976 wrote to memory of 4020 3976 omsecor.exe 99 PID 4020 wrote to memory of 4940 4020 omsecor.exe 100 PID 4020 wrote to memory of 4940 4020 omsecor.exe 100 PID 4020 wrote to memory of 4940 4020 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5e927d856699dc9553c240d2200708c6b
SHA1fe421741c4e09f781abd04e39d775380614f95b4
SHA25647edcc7ac4f4585e31bfac458a9607d87eadce0b15e17a0729c34006afdddfa1
SHA5126650a52834f1f1d430c136dd602a99a8ee876e40aadb700a62743e76914e927a1e15a0943e933d3688849f48819aa0ca2aa48280a7d9b4e1a13dc7272982f28d
-
Filesize
68KB
MD57f86ccfd9beee3f3aab42c09d974aa8e
SHA1cf112ceba34535e4d7d85a5a9f29a780ea48716d
SHA256805ac85a677aefdb135992f5ace9d975d34f808b2dcf885633ba796f5e8fec5a
SHA51289ff304f0ba7ed20cd5ca28a21419d16b21fb4511ba6c52767aa6e93271f17e38af617e1b89b4a561443a5aade135f22f0fd6a5eb2e38e4c6f9f57e72d506064
-
Filesize
68KB
MD5c451012cf44e4b545a31ba0035e83d52
SHA1d91da5aa3f62f5c15532830685f15c6ec5b59641
SHA2569cb431774b585689056f2c7ddbc135e7d32cb757d9ea26b4fbd5240933b218c5
SHA512cc1e3f61892aae23fa6b38afed56345149bf65900eea7a48b13c891ba7519e06f6c8527bd0d2dd72067d734690afa9d63539ee5dcccaf2fb304d0bcbc9fb78c5