Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2023, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.541c7d11f0f3739d35437153c4329670.exe
Resource
win7-20231023-en
General
-
Target
NEAS.541c7d11f0f3739d35437153c4329670.exe
-
Size
134KB
-
MD5
541c7d11f0f3739d35437153c4329670
-
SHA1
0046e4b6cb3b1f579d01df55877dcf5cf9ef59d4
-
SHA256
9e2f32e6a66f3f6a79928ba8b77e411b64dbe3377f27a264c7931e7f58d80bf0
-
SHA512
26a51dfe3ebdf96c217c1b80a3983f0dbfe8bbd891b14bf830226ff18842bc14357f776af3069cd17bf204f20829fe7f04fd00cbcd381ed41cb83f409b4048fe
-
SSDEEP
1536:hDfDbhERTatPLTH0NqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwC7M:BiRTeH0NqAW6J6f1tqF6dngNmaZC7M
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 5040 omsecor.exe 968 omsecor.exe 100 omsecor.exe 4672 omsecor.exe 1340 omsecor.exe 2080 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1080 set thread context of 4372 1080 NEAS.541c7d11f0f3739d35437153c4329670.exe 90 PID 5040 set thread context of 968 5040 omsecor.exe 96 PID 100 set thread context of 4672 100 omsecor.exe 116 PID 1340 set thread context of 2080 1340 omsecor.exe 120 -
Program crash 4 IoCs
pid pid_target Process procid_target 2736 1080 WerFault.exe 87 732 5040 WerFault.exe 94 3556 100 WerFault.exe 115 3388 1340 WerFault.exe 119 -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4372 1080 NEAS.541c7d11f0f3739d35437153c4329670.exe 90 PID 1080 wrote to memory of 4372 1080 NEAS.541c7d11f0f3739d35437153c4329670.exe 90 PID 1080 wrote to memory of 4372 1080 NEAS.541c7d11f0f3739d35437153c4329670.exe 90 PID 1080 wrote to memory of 4372 1080 NEAS.541c7d11f0f3739d35437153c4329670.exe 90 PID 1080 wrote to memory of 4372 1080 NEAS.541c7d11f0f3739d35437153c4329670.exe 90 PID 4372 wrote to memory of 5040 4372 NEAS.541c7d11f0f3739d35437153c4329670.exe 94 PID 4372 wrote to memory of 5040 4372 NEAS.541c7d11f0f3739d35437153c4329670.exe 94 PID 4372 wrote to memory of 5040 4372 NEAS.541c7d11f0f3739d35437153c4329670.exe 94 PID 5040 wrote to memory of 968 5040 omsecor.exe 96 PID 5040 wrote to memory of 968 5040 omsecor.exe 96 PID 5040 wrote to memory of 968 5040 omsecor.exe 96 PID 5040 wrote to memory of 968 5040 omsecor.exe 96 PID 5040 wrote to memory of 968 5040 omsecor.exe 96 PID 968 wrote to memory of 100 968 omsecor.exe 115 PID 968 wrote to memory of 100 968 omsecor.exe 115 PID 968 wrote to memory of 100 968 omsecor.exe 115 PID 100 wrote to memory of 4672 100 omsecor.exe 116 PID 100 wrote to memory of 4672 100 omsecor.exe 116 PID 100 wrote to memory of 4672 100 omsecor.exe 116 PID 100 wrote to memory of 4672 100 omsecor.exe 116 PID 100 wrote to memory of 4672 100 omsecor.exe 116 PID 4672 wrote to memory of 1340 4672 omsecor.exe 119 PID 4672 wrote to memory of 1340 4672 omsecor.exe 119 PID 4672 wrote to memory of 1340 4672 omsecor.exe 119 PID 1340 wrote to memory of 2080 1340 omsecor.exe 120 PID 1340 wrote to memory of 2080 1340 omsecor.exe 120 PID 1340 wrote to memory of 2080 1340 omsecor.exe 120 PID 1340 wrote to memory of 2080 1340 omsecor.exe 120 PID 1340 wrote to memory of 2080 1340 omsecor.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.541c7d11f0f3739d35437153c4329670.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.541c7d11f0f3739d35437153c4329670.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\NEAS.541c7d11f0f3739d35437153c4329670.exeC:\Users\Admin\AppData\Local\Temp\NEAS.541c7d11f0f3739d35437153c4329670.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 2568⤵
- Program crash
PID:3388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 2926⤵
- Program crash
PID:3556
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 2884⤵
- Program crash
PID:732
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 3002⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1080 -ip 10801⤵PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5040 -ip 50401⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 100 -ip 1001⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1340 -ip 13401⤵PID:2156
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD5b419841152e95f3779e6e8cc8de4ded3
SHA10b4d09567d3c7e10bf24bc7d5858f4f51741a88e
SHA256b441fbb5d1d882cea9f3ef7360d3730e061d95a8b9486c1292902c49070a5250
SHA512c7dfec10c5e9f2864359c6eb9eb76b1269bfed9662a7394d36a29ba7d6200eedf818165cdaf86089a3cfffeee2e67b513eaf94f8cfe0ffe5016bda30ed1ffabf
-
Filesize
134KB
MD5b419841152e95f3779e6e8cc8de4ded3
SHA10b4d09567d3c7e10bf24bc7d5858f4f51741a88e
SHA256b441fbb5d1d882cea9f3ef7360d3730e061d95a8b9486c1292902c49070a5250
SHA512c7dfec10c5e9f2864359c6eb9eb76b1269bfed9662a7394d36a29ba7d6200eedf818165cdaf86089a3cfffeee2e67b513eaf94f8cfe0ffe5016bda30ed1ffabf
-
Filesize
134KB
MD5b419841152e95f3779e6e8cc8de4ded3
SHA10b4d09567d3c7e10bf24bc7d5858f4f51741a88e
SHA256b441fbb5d1d882cea9f3ef7360d3730e061d95a8b9486c1292902c49070a5250
SHA512c7dfec10c5e9f2864359c6eb9eb76b1269bfed9662a7394d36a29ba7d6200eedf818165cdaf86089a3cfffeee2e67b513eaf94f8cfe0ffe5016bda30ed1ffabf
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD534a88f804b7ff34506dccf9112fd116f
SHA1a6110c50728ad94dfa5b64d67d037e2c3635f8ad
SHA256c18ea3db0403f25a2417f0a7f25590874c6b2b36e10f5ad6ba7ad07a6885b08c
SHA51224ca3131c4c12c44ed21b799059106d0d78f3ead53009f9cea6d5d79b1b7cc1882aff62e9a6cdf9d6a89e30279e078f74f6f2750f051429228427269a64b96c6
-
Filesize
134KB
MD534a88f804b7ff34506dccf9112fd116f
SHA1a6110c50728ad94dfa5b64d67d037e2c3635f8ad
SHA256c18ea3db0403f25a2417f0a7f25590874c6b2b36e10f5ad6ba7ad07a6885b08c
SHA51224ca3131c4c12c44ed21b799059106d0d78f3ead53009f9cea6d5d79b1b7cc1882aff62e9a6cdf9d6a89e30279e078f74f6f2750f051429228427269a64b96c6
-
Filesize
134KB
MD534a88f804b7ff34506dccf9112fd116f
SHA1a6110c50728ad94dfa5b64d67d037e2c3635f8ad
SHA256c18ea3db0403f25a2417f0a7f25590874c6b2b36e10f5ad6ba7ad07a6885b08c
SHA51224ca3131c4c12c44ed21b799059106d0d78f3ead53009f9cea6d5d79b1b7cc1882aff62e9a6cdf9d6a89e30279e078f74f6f2750f051429228427269a64b96c6