Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
afbd69be0464f2b923e84d86121838a0N.exe
Resource
win7-20240705-en
General
-
Target
afbd69be0464f2b923e84d86121838a0N.exe
-
Size
134KB
-
MD5
afbd69be0464f2b923e84d86121838a0
-
SHA1
4e86c4a8b465058f04e63e1e1749bddbc31931f7
-
SHA256
ebbe51ddad5dd8e18115a495db5ea4736405692b5436775a05d34838b8375f3a
-
SHA512
98784665d6e3f0388073bcaf630cd8d282b1d9cd95374f30515276c9fb7438913ecafaaf00594ab325da1abb353315d45da393eb5dc7f60791559c98ee53f97a
-
SSDEEP
1536:WDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:IiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2600 omsecor.exe 4444 omsecor.exe 2084 omsecor.exe 3304 omsecor.exe 4592 omsecor.exe 1440 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3244 set thread context of 3468 3244 afbd69be0464f2b923e84d86121838a0N.exe 84 PID 2600 set thread context of 4444 2600 omsecor.exe 89 PID 2084 set thread context of 3304 2084 omsecor.exe 99 PID 4592 set thread context of 1440 4592 omsecor.exe 103 -
Program crash 4 IoCs
pid pid_target Process procid_target 2204 3244 WerFault.exe 82 3080 2600 WerFault.exe 86 2748 2084 WerFault.exe 98 4116 4592 WerFault.exe 101 -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3244 wrote to memory of 3468 3244 afbd69be0464f2b923e84d86121838a0N.exe 84 PID 3244 wrote to memory of 3468 3244 afbd69be0464f2b923e84d86121838a0N.exe 84 PID 3244 wrote to memory of 3468 3244 afbd69be0464f2b923e84d86121838a0N.exe 84 PID 3244 wrote to memory of 3468 3244 afbd69be0464f2b923e84d86121838a0N.exe 84 PID 3244 wrote to memory of 3468 3244 afbd69be0464f2b923e84d86121838a0N.exe 84 PID 3468 wrote to memory of 2600 3468 afbd69be0464f2b923e84d86121838a0N.exe 86 PID 3468 wrote to memory of 2600 3468 afbd69be0464f2b923e84d86121838a0N.exe 86 PID 3468 wrote to memory of 2600 3468 afbd69be0464f2b923e84d86121838a0N.exe 86 PID 2600 wrote to memory of 4444 2600 omsecor.exe 89 PID 2600 wrote to memory of 4444 2600 omsecor.exe 89 PID 2600 wrote to memory of 4444 2600 omsecor.exe 89 PID 2600 wrote to memory of 4444 2600 omsecor.exe 89 PID 2600 wrote to memory of 4444 2600 omsecor.exe 89 PID 4444 wrote to memory of 2084 4444 omsecor.exe 98 PID 4444 wrote to memory of 2084 4444 omsecor.exe 98 PID 4444 wrote to memory of 2084 4444 omsecor.exe 98 PID 2084 wrote to memory of 3304 2084 omsecor.exe 99 PID 2084 wrote to memory of 3304 2084 omsecor.exe 99 PID 2084 wrote to memory of 3304 2084 omsecor.exe 99 PID 2084 wrote to memory of 3304 2084 omsecor.exe 99 PID 2084 wrote to memory of 3304 2084 omsecor.exe 99 PID 3304 wrote to memory of 4592 3304 omsecor.exe 101 PID 3304 wrote to memory of 4592 3304 omsecor.exe 101 PID 3304 wrote to memory of 4592 3304 omsecor.exe 101 PID 4592 wrote to memory of 1440 4592 omsecor.exe 103 PID 4592 wrote to memory of 1440 4592 omsecor.exe 103 PID 4592 wrote to memory of 1440 4592 omsecor.exe 103 PID 4592 wrote to memory of 1440 4592 omsecor.exe 103 PID 4592 wrote to memory of 1440 4592 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\afbd69be0464f2b923e84d86121838a0N.exe"C:\Users\Admin\AppData\Local\Temp\afbd69be0464f2b923e84d86121838a0N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\afbd69be0464f2b923e84d86121838a0N.exeC:\Users\Admin\AppData\Local\Temp\afbd69be0464f2b923e84d86121838a0N.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
PID:1440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 2568⤵
- Program crash
PID:4116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 2926⤵
- Program crash
PID:2748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 2964⤵
- Program crash
PID:3080
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3244 -s 2882⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3244 -ip 32441⤵PID:3820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2600 -ip 26001⤵PID:544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2084 -ip 20841⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4592 -ip 45921⤵PID:872
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5440c9f4ac0cb074633de5574a73a4571
SHA1fee3602d6029a80bd154ced2ebec417677c4206a
SHA2567696a0df7e0048cffb78452ac1f337d3ae92f95cd2c8d16f537f8a45faf1ba11
SHA512fd0024b0cc789eaf1bff11c5221ebe8ce51a5e41a2430b9638f07eeb47764a46583e0dadfe4322f3efeb02b527af26fb8f787909fcd4ba63ab289976b9642f7d
-
Filesize
134KB
MD5f401753ca322f1287b7388fe1e7da389
SHA10029f85fd017b69e1de3dca7a7d2894ffc9b9798
SHA256f5aade652af43c5063f9a0ad6b7561a160775fddc09206262354b2a08df70ecf
SHA51246518a3392a4b0d19a40f8bd76e68fc4a13305b00170fbfed5329cec7fb50e09c069d79a80fadde2f52df8fe011a94893d535906cbcd2ec669af09ddddb667df
-
Filesize
134KB
MD511d150b1d1e715ca79308ab2ca8a234b
SHA1bab123adc90f2e109c6488f26434717fd7afc287
SHA256bc5fcbde761975054521ff005b7615b743328a8b1ce2d982f7f71bd5a7bd03bf
SHA5124501d5cb1e928c2f13d93f35f106268e439dae62934f60f51a2bea710f465629fceb92bcb477baaa63fe82e3b91e93f8b8c3ca4efb566af76c775ac5e869d9df