Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 03:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe
-
Size
128KB
-
MD5
01b36e0afa6cf15ee49ba2c56994f33f
-
SHA1
d3449d903ff8473fd6efd34808f7cb0802a7d3ef
-
SHA256
17c155d38b7255f10a57d43f44014dd6d0b1c28201e62db9c08d39e10ef064c6
-
SHA512
530b75c4052de6c7d1b5d6b0a34a4007a19efc31c52682625c079bd51847c97d1e200b9bdeadd923af3064a53c7ae365e4a32b124e60c42fd11682788293d9c2
-
SSDEEP
1536:GDfDbhERTatPLTLLbC+8BMNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabau:4iRTe3n8BMAW6J6f1tqF6dngNmaZrN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2280 omsecor.exe 2388 omsecor.exe 2944 omsecor.exe 2996 omsecor.exe 844 omsecor.exe 2412 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2372 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 2372 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 2280 omsecor.exe 2388 omsecor.exe 2388 omsecor.exe 2996 omsecor.exe 2996 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1748 set thread context of 2372 1748 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 30 PID 2280 set thread context of 2388 2280 omsecor.exe 32 PID 2944 set thread context of 2996 2944 omsecor.exe 36 PID 844 set thread context of 2412 844 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2372 1748 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 30 PID 1748 wrote to memory of 2372 1748 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 30 PID 1748 wrote to memory of 2372 1748 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 30 PID 1748 wrote to memory of 2372 1748 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 30 PID 1748 wrote to memory of 2372 1748 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 30 PID 1748 wrote to memory of 2372 1748 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 30 PID 2372 wrote to memory of 2280 2372 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 31 PID 2372 wrote to memory of 2280 2372 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 31 PID 2372 wrote to memory of 2280 2372 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 31 PID 2372 wrote to memory of 2280 2372 JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe 31 PID 2280 wrote to memory of 2388 2280 omsecor.exe 32 PID 2280 wrote to memory of 2388 2280 omsecor.exe 32 PID 2280 wrote to memory of 2388 2280 omsecor.exe 32 PID 2280 wrote to memory of 2388 2280 omsecor.exe 32 PID 2280 wrote to memory of 2388 2280 omsecor.exe 32 PID 2280 wrote to memory of 2388 2280 omsecor.exe 32 PID 2388 wrote to memory of 2944 2388 omsecor.exe 35 PID 2388 wrote to memory of 2944 2388 omsecor.exe 35 PID 2388 wrote to memory of 2944 2388 omsecor.exe 35 PID 2388 wrote to memory of 2944 2388 omsecor.exe 35 PID 2944 wrote to memory of 2996 2944 omsecor.exe 36 PID 2944 wrote to memory of 2996 2944 omsecor.exe 36 PID 2944 wrote to memory of 2996 2944 omsecor.exe 36 PID 2944 wrote to memory of 2996 2944 omsecor.exe 36 PID 2944 wrote to memory of 2996 2944 omsecor.exe 36 PID 2944 wrote to memory of 2996 2944 omsecor.exe 36 PID 2996 wrote to memory of 844 2996 omsecor.exe 37 PID 2996 wrote to memory of 844 2996 omsecor.exe 37 PID 2996 wrote to memory of 844 2996 omsecor.exe 37 PID 2996 wrote to memory of 844 2996 omsecor.exe 37 PID 844 wrote to memory of 2412 844 omsecor.exe 38 PID 844 wrote to memory of 2412 844 omsecor.exe 38 PID 844 wrote to memory of 2412 844 omsecor.exe 38 PID 844 wrote to memory of 2412 844 omsecor.exe 38 PID 844 wrote to memory of 2412 844 omsecor.exe 38 PID 844 wrote to memory of 2412 844 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_01b36e0afa6cf15ee49ba2c56994f33f.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD53defeeae711daf9a6d3cf2c344612392
SHA18edb83e3de0a7a35353b6385f7291d7813e71d7a
SHA2562fac71169f4d7d0a00b5226b6b131a9a6bb85fcbde768debd0dce046511c7e63
SHA5126f257bbe9ae4509e573bd2d7db5b7995fcb107f91c8231dedc8866f3f8e17cef546666915e06e2db399a145bfe4ce4235a46dd4473524f358bf6963008c72b1a
-
Filesize
128KB
MD5d1fb9394ee06dc53a4b071e5b020a70f
SHA1176a7fef580236c0ac8bc8417feb4215ebaf3437
SHA256b24b5f7d321e644b7bc4a5fb118e89daec8c825f980a3520a42c0c0dac664d8e
SHA5120949add432d2508a98901cfea09f446ea042887062204bd9ff41ff0638c0a7ff83680ad731c8752a5fea1f2e4930d5a8c0d72668641d9c054b2659c4fb285d7d
-
Filesize
128KB
MD50e727972913ffc2632be4cb385f32da9
SHA1c4092c89bc6c48b46dda8276967f4424e5dc79b1
SHA25660a8e38f138d8842eea40ff0e5959cb2558c3d9decf146e937a5be2cb4cf879e
SHA51226e506c628310fb456cb9d80932700b2ee8d92fefa7b0d1b173fe587325fcbac4e9244bde12d941d54ec0c4f1826bb43d108f501c4b2c5a2085a7ac5b199add7