Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/09/2024, 11:40
Behavioral task
behavioral1
Sample
c46fff229beffaa4bed28830fd469970N.exe
Resource
win7-20240903-en
General
-
Target
c46fff229beffaa4bed28830fd469970N.exe
-
Size
35KB
-
MD5
c46fff229beffaa4bed28830fd469970
-
SHA1
67fe5c721624cd5df0cb7a9d8fab5a3f575433ef
-
SHA256
731a20881bd70bc2cdb997d35728400423fe1fde5e8a463e59f0e854f4c60c60
-
SHA512
1881dfb2b232c551074caaaef13a18d0892f98e6a653d1f22c3c4ab9fe2a4e06210d5785cf8b5451ffc39909332d6b081ddb39c92dc938b87de538fdbb872cbc
-
SSDEEP
768:D6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:+8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2736 omsecor.exe 1428 omsecor.exe 328 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1580 c46fff229beffaa4bed28830fd469970N.exe 1580 c46fff229beffaa4bed28830fd469970N.exe 2736 omsecor.exe 2736 omsecor.exe 1428 omsecor.exe 1428 omsecor.exe -
resource yara_rule behavioral1/memory/1580-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x000c00000001226b-10.dat upx behavioral1/memory/1580-9-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2736-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2736-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2736-17-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2736-20-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2736-23-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x0036000000016dd5-25.dat upx behavioral1/memory/2736-26-0x00000000002A0000-0x00000000002CD000-memory.dmp upx behavioral1/memory/2736-34-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x000c00000001226b-37.dat upx behavioral1/memory/328-46-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1428-44-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/328-48-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c46fff229beffaa4bed28830fd469970N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2736 1580 c46fff229beffaa4bed28830fd469970N.exe 30 PID 1580 wrote to memory of 2736 1580 c46fff229beffaa4bed28830fd469970N.exe 30 PID 1580 wrote to memory of 2736 1580 c46fff229beffaa4bed28830fd469970N.exe 30 PID 1580 wrote to memory of 2736 1580 c46fff229beffaa4bed28830fd469970N.exe 30 PID 2736 wrote to memory of 1428 2736 omsecor.exe 33 PID 2736 wrote to memory of 1428 2736 omsecor.exe 33 PID 2736 wrote to memory of 1428 2736 omsecor.exe 33 PID 2736 wrote to memory of 1428 2736 omsecor.exe 33 PID 1428 wrote to memory of 328 1428 omsecor.exe 34 PID 1428 wrote to memory of 328 1428 omsecor.exe 34 PID 1428 wrote to memory of 328 1428 omsecor.exe 34 PID 1428 wrote to memory of 328 1428 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c46fff229beffaa4bed28830fd469970N.exe"C:\Users\Admin\AppData\Local\Temp\c46fff229beffaa4bed28830fd469970N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:328
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD55d2bf1f543428a56db44001cd83a7290
SHA1064213cb493876648bfc32b5ee5e19b658c65377
SHA256e91f9e7aced7b7b6c56ff3f50e7625772304a89c448965622d41df8e0addb78b
SHA512466f8d7b8a86f2dc162b3d1fea637ee203b700f3436253d2e8785a91db02f0a2177c9f32fc6f24fbb0bf84aa7c923d9fe55496fd5041ec737165e810e2a695fa
-
Filesize
35KB
MD568f0e3d020e683617f1a036ec499d59e
SHA11ffedd1d83642441ebe67f7dbc283e34baad3ce3
SHA25619081b93e656bde7b24950376b8227541b7b75cf06495d5eaeec8542cb40c798
SHA5125c5ffd33821a03f95b68c6462741fe9a37a3d68b1144477f14bdbbaef372532e33b41cae4003ec7c3a86bf03c3f4017492dc329b6b0fadda924c178c0752353f
-
Filesize
35KB
MD552feef0a5f2ff0bff4edb71b622becd9
SHA16c19b826f152459ac186b7203c8be812adc5007c
SHA2560f1a060b6bbd5a658e47afa4e38adf0c24b770fad94fa1cd6ecacff6dae68c88
SHA5122d92cdc857eb9d96ccf7e33e9a1d759090b2c43132520d2b3f68a3f4df832779635dc47b33b9c70bb57e8cb75487922eb1c416782f5d7899edf74e5570d2c43b