Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 10:55
Behavioral task
behavioral1
Sample
JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe
-
Size
68KB
-
MD5
ff49e72ad68a412debd2d538c47914b5
-
SHA1
4d2e6c367834f0e9cf0ee393fbf3ab2038fbf89b
-
SHA256
ca252b3cf3a4886d723368026ab0fbb29c0a469158cedee9c74dd0c08498c9bc
-
SHA512
c03621f31ba7591b43271d906ec7e0b97084fd442e69a3b7062ab6eec4c0f4e4d1c2585042167725eef3a07aa96f6ad1a931ccefff378bf04dbf4d56196c7998
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:LdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2204 omsecor.exe 2124 omsecor.exe 1816 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2408 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 2408 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 2204 omsecor.exe 2204 omsecor.exe 2124 omsecor.exe 2124 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2204 2408 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 30 PID 2408 wrote to memory of 2204 2408 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 30 PID 2408 wrote to memory of 2204 2408 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 30 PID 2408 wrote to memory of 2204 2408 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 30 PID 2204 wrote to memory of 2124 2204 omsecor.exe 33 PID 2204 wrote to memory of 2124 2204 omsecor.exe 33 PID 2204 wrote to memory of 2124 2204 omsecor.exe 33 PID 2204 wrote to memory of 2124 2204 omsecor.exe 33 PID 2124 wrote to memory of 1816 2124 omsecor.exe 34 PID 2124 wrote to memory of 1816 2124 omsecor.exe 34 PID 2124 wrote to memory of 1816 2124 omsecor.exe 34 PID 2124 wrote to memory of 1816 2124 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5fc15fd6ac6128d30f84f164bd72f3925
SHA12162e107278a68e264bfc0c1e9b29b2b6892e29d
SHA256afc861d96a7eedb2b97bc79808cebec0f1d1ec89f6a9001bdd6708e5acc98d91
SHA512019c176478e42843447be88e148f3c227147c912a27cd3f37e36de35f27d1db83a9508cff2d7c4043314dcab187b08545ca1269b37f7444fe6baa327e9dfc406
-
Filesize
68KB
MD5b79f6456483571ff2aca632723efa77f
SHA121d01925192b661ca0a3a2089b0725d7a3846d39
SHA256e4c5cf208085f8ed029eb947508c525027189981f2b6650cf991d6ba04f990b5
SHA512bbc503c1d3f9d72a056bf1c859651cc75e8a797f5a82cc2965389c9e621a4b8d55363535b7882bd089224b500ea870909b2a9a58641f739cab3e630f9ef98e88
-
Filesize
68KB
MD51f91c58dd90e79f6904ab1dcccc5abf6
SHA1ccbe3c1894391b5969e7765e6b3f51958fcbe645
SHA25685b26d1d4362eb2aaeca9d735482c6595df97f06110682f254cb13197fe27896
SHA51288cbebd1c2d30f4c007d6e7bf7f243791b95533bf9f5e44a2f7570a6bf719949fafacbcf4a402360c74cec81689c40c4e27e3f80aa7f505c08a3b3782358c193