Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 10:55
Behavioral task
behavioral1
Sample
JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe
-
Size
68KB
-
MD5
ff49e72ad68a412debd2d538c47914b5
-
SHA1
4d2e6c367834f0e9cf0ee393fbf3ab2038fbf89b
-
SHA256
ca252b3cf3a4886d723368026ab0fbb29c0a469158cedee9c74dd0c08498c9bc
-
SHA512
c03621f31ba7591b43271d906ec7e0b97084fd442e69a3b7062ab6eec4c0f4e4d1c2585042167725eef3a07aa96f6ad1a931ccefff378bf04dbf4d56196c7998
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:LdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3596 omsecor.exe 2728 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3596 1484 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 84 PID 1484 wrote to memory of 3596 1484 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 84 PID 1484 wrote to memory of 3596 1484 JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe 84 PID 3596 wrote to memory of 2728 3596 omsecor.exe 94 PID 3596 wrote to memory of 2728 3596 omsecor.exe 94 PID 3596 wrote to memory of 2728 3596 omsecor.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5b79f6456483571ff2aca632723efa77f
SHA121d01925192b661ca0a3a2089b0725d7a3846d39
SHA256e4c5cf208085f8ed029eb947508c525027189981f2b6650cf991d6ba04f990b5
SHA512bbc503c1d3f9d72a056bf1c859651cc75e8a797f5a82cc2965389c9e621a4b8d55363535b7882bd089224b500ea870909b2a9a58641f739cab3e630f9ef98e88
-
Filesize
68KB
MD5e3378d4da1ae3a3b990e55c5ac35fb44
SHA1af0d62afe51cf139be10651eb22a1bfd2aa4003c
SHA256a2a37d7f6932d74bbfbdf3014617f7a00808c915786ce05220bdab04215b81f8
SHA51260cc46fce22fb493587d5f9567f462b376a11cd0208181d65c30f3fcb2734e67138743a8ec2137fb519a321cdcbddb38ade4d829b89068ec16f1028e507036a7