Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 11:40
Behavioral task
behavioral1
Sample
c46fff229beffaa4bed28830fd469970N.exe
Resource
win7-20240903-en
General
-
Target
c46fff229beffaa4bed28830fd469970N.exe
-
Size
35KB
-
MD5
c46fff229beffaa4bed28830fd469970
-
SHA1
67fe5c721624cd5df0cb7a9d8fab5a3f575433ef
-
SHA256
731a20881bd70bc2cdb997d35728400423fe1fde5e8a463e59f0e854f4c60c60
-
SHA512
1881dfb2b232c551074caaaef13a18d0892f98e6a653d1f22c3c4ab9fe2a4e06210d5785cf8b5451ffc39909332d6b081ddb39c92dc938b87de538fdbb872cbc
-
SSDEEP
768:D6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:+8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4004 omsecor.exe 1960 omsecor.exe -
resource yara_rule behavioral2/memory/1568-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000a00000002345f-3.dat upx behavioral2/memory/4004-4-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1568-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4004-8-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4004-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4004-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4004-15-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x0008000000023474-18.dat upx behavioral2/memory/1960-19-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4004-22-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1960-23-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c46fff229beffaa4bed28830fd469970N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1568 wrote to memory of 4004 1568 c46fff229beffaa4bed28830fd469970N.exe 85 PID 1568 wrote to memory of 4004 1568 c46fff229beffaa4bed28830fd469970N.exe 85 PID 1568 wrote to memory of 4004 1568 c46fff229beffaa4bed28830fd469970N.exe 85 PID 4004 wrote to memory of 1960 4004 omsecor.exe 96 PID 4004 wrote to memory of 1960 4004 omsecor.exe 96 PID 4004 wrote to memory of 1960 4004 omsecor.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c46fff229beffaa4bed28830fd469970N.exe"C:\Users\Admin\AppData\Local\Temp\c46fff229beffaa4bed28830fd469970N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD55d2bf1f543428a56db44001cd83a7290
SHA1064213cb493876648bfc32b5ee5e19b658c65377
SHA256e91f9e7aced7b7b6c56ff3f50e7625772304a89c448965622d41df8e0addb78b
SHA512466f8d7b8a86f2dc162b3d1fea637ee203b700f3436253d2e8785a91db02f0a2177c9f32fc6f24fbb0bf84aa7c923d9fe55496fd5041ec737165e810e2a695fa
-
Filesize
35KB
MD5f4e7a311a302b2a016b872e1d9ed0329
SHA10e29a3a55eb07aafb23ea78a7b3dc3f074e214b4
SHA256d698820357f6531cbdd847f44139a47bbf8a46ee9d6baa18bd8376c407d0646d
SHA512cbb317a22698747252f1e033e3e272b73b4419086fbae331fd3d6fe0974091825479a13294b16a3741a61e24c99862575e28c1e1c090eef5ea39a65fe8d3d62a