Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:58
Behavioral task
behavioral1
Sample
JaffaCakes118_f8e19ff1e27a87d3624c6ce2da5b8bfe.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_f8e19ff1e27a87d3624c6ce2da5b8bfe.exe
-
Size
3.2MB
-
MD5
f8e19ff1e27a87d3624c6ce2da5b8bfe
-
SHA1
da3602e58f5e6503b34dcd912a8f934d9fc329bd
-
SHA256
9a98a2728de2eea7db2532bbf8f79c6ec1dc6a120fe07103807b03434acedd84
-
SHA512
d4da0be9f66ba3771de6eab8b31e48e2468c25006d1e275292bef422fdd97afcc48162f040dd82e21d12b43396ced8fd13c038868ee4f729fa1777c5e26e734e
-
SSDEEP
24576:gOsfW+/6oTFwh3Qh3YZrxEu8CL7W2Y7TjtWDlp5DB:J6W+TFq6IZj8N2Y7T5GF
Malware Config
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2212 omsecor.exe 1992 omsecor.exe 2176 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f8e19ff1e27a87d3624c6ce2da5b8bfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2212 2064 JaffaCakes118_f8e19ff1e27a87d3624c6ce2da5b8bfe.exe 83 PID 2064 wrote to memory of 2212 2064 JaffaCakes118_f8e19ff1e27a87d3624c6ce2da5b8bfe.exe 83 PID 2064 wrote to memory of 2212 2064 JaffaCakes118_f8e19ff1e27a87d3624c6ce2da5b8bfe.exe 83 PID 2212 wrote to memory of 1992 2212 omsecor.exe 101 PID 2212 wrote to memory of 1992 2212 omsecor.exe 101 PID 2212 wrote to memory of 1992 2212 omsecor.exe 101 PID 1992 wrote to memory of 2176 1992 omsecor.exe 102 PID 1992 wrote to memory of 2176 1992 omsecor.exe 102 PID 1992 wrote to memory of 2176 1992 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f8e19ff1e27a87d3624c6ce2da5b8bfe.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f8e19ff1e27a87d3624c6ce2da5b8bfe.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5b999a3cc657f92d1bec910d2646b855a
SHA107d2317d9c369cf0dc4465c8b054788ca4783d4c
SHA256754326e92377be7ffe495eab3cd186abe939003c4df548a73ca91bd948fe0ce8
SHA5125b8fcdb006c5baf9d1e0d33a155cb1270129321b03e63e26e246124b5380db6979ea41a38a9527323d6e5cdddb9e89604a65adf240eba6717ba31024c2b1c0ae
-
Filesize
3.2MB
MD59da60cdd2adb3718d3934ab44d336e16
SHA1fe224debdfaadcfa1d69e5e8bb66e11f0ed4a6c3
SHA2566ffe895cabe94fb3b5fe0368ce7e0726573eba71b73c86383a01f33bef4234e6
SHA512783cc22e86c1f10177161b5cda634d1793289b453291b6ae35784ca1fe9ef79a3ba5686e3f62dd197052c6fd09a8f8e7530631f4eb89d63eed097228685be895
-
Filesize
3.2MB
MD5f6a60f287fa2c157fe1021820154a2c6
SHA1b8ac2d1f98834b8c075be7e38b372971a8447377
SHA256e5d808a4cc8d54939f0ce510cf8c1d0716d9ee1317d4694d8e463c30f6895069
SHA512edc7e049c4fcfb9a32d989bd706ddd2954f160661f42cd05e95de7744fe1787bb2066f553928dc73a45935a14b0c7a05b980f7dcacaca970d0e968ff1c0ad298