Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 18:47
Behavioral task
behavioral1
Sample
10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe
Resource
win7-20231129-en
General
-
Target
10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe
-
Size
68KB
-
MD5
39d600ea102b74e8c29822f860a6588f
-
SHA1
ac3e5914070ce75c6663d966aa0d6a0bd6c2f0ba
-
SHA256
10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149
-
SHA512
9b8150df5e84cbdf136642315cd57e0fdbc100fb8fd4eeabdeb251a9f26385eaaf8b809a6cb01c2c495f153c59336a5cae4e427702d5d883e1b1ec704aaec2bc
-
SSDEEP
1536:Td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:TdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1660 omsecor.exe 2748 omsecor.exe 1092 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2304 10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe 2304 10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe 1660 omsecor.exe 1660 omsecor.exe 2748 omsecor.exe 2748 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1660 2304 10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe 28 PID 2304 wrote to memory of 1660 2304 10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe 28 PID 2304 wrote to memory of 1660 2304 10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe 28 PID 2304 wrote to memory of 1660 2304 10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe 28 PID 1660 wrote to memory of 2748 1660 omsecor.exe 32 PID 1660 wrote to memory of 2748 1660 omsecor.exe 32 PID 1660 wrote to memory of 2748 1660 omsecor.exe 32 PID 1660 wrote to memory of 2748 1660 omsecor.exe 32 PID 2748 wrote to memory of 1092 2748 omsecor.exe 33 PID 2748 wrote to memory of 1092 2748 omsecor.exe 33 PID 2748 wrote to memory of 1092 2748 omsecor.exe 33 PID 2748 wrote to memory of 1092 2748 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe"C:\Users\Admin\AppData\Local\Temp\10be9207f89cbc7d808698723e9bb229e63f354d3a53b962c97de3a5689a7149.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:1092
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5ba2936b326c2e7f69a66fed9f2f56330
SHA138c53f53467334f9121eb937650257cff0adaddb
SHA256ad2a5cc561e3697e25b392f39e4b4e1010e661104304270deabbc1f0bed0d47f
SHA512997597328d659f50b2122f2f16faaff8c4703f68721565df03e0687e30eddf54d680d2900bd241e3547fc5981214a1adeb95815ebac9b6070df8c72a9c41dc9d
-
Filesize
68KB
MD5b3fd6e181cebe1dd4193d3b79c86c467
SHA1db25371e4788bb7db90a8a54ac5ceebe20995ae2
SHA2560f671a41ff777b720c73b4d9c0441b3c15078c57b66e01d426f31782a7a6b308
SHA512f241dba4671ad953efbaf9e3f6a3f215d8677cde76d4e34ff6c80422bfaa8c74c3c27de96f9819bb3f349949d081eb3a7a04577ce881263ca55b456aaa9b896f
-
Filesize
68KB
MD5230fadc47690357045e08649181b138d
SHA11f5bf6e41374f160f29b4df3a406b6a6de5cf821
SHA256081c1b8888561242779a54b9c40b40ca651397af13a3ec956e06b6bc8348ddc1
SHA51269c595e92eeef7d35790682714ba42d8225439637726e3a1fe9714a76f6ad9258dae9df6b9ea59f47f67fbe2b4ad11f2958db0a618bd68e8b0fd8deefcbcd7f6