Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    115s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 11:40

General

  • Target

    c46fff229beffaa4bed28830fd469970N.exe

  • Size

    35KB

  • MD5

    c46fff229beffaa4bed28830fd469970

  • SHA1

    67fe5c721624cd5df0cb7a9d8fab5a3f575433ef

  • SHA256

    731a20881bd70bc2cdb997d35728400423fe1fde5e8a463e59f0e854f4c60c60

  • SHA512

    1881dfb2b232c551074caaaef13a18d0892f98e6a653d1f22c3c4ab9fe2a4e06210d5785cf8b5451ffc39909332d6b081ddb39c92dc938b87de538fdbb872cbc

  • SSDEEP

    768:D6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:+8Z0kA7FHlO2OwOTUtKjpB

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c46fff229beffaa4bed28830fd469970N.exe
    "C:\Users\Admin\AppData\Local\Temp\c46fff229beffaa4bed28830fd469970N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4004
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    35KB

    MD5

    5d2bf1f543428a56db44001cd83a7290

    SHA1

    064213cb493876648bfc32b5ee5e19b658c65377

    SHA256

    e91f9e7aced7b7b6c56ff3f50e7625772304a89c448965622d41df8e0addb78b

    SHA512

    466f8d7b8a86f2dc162b3d1fea637ee203b700f3436253d2e8785a91db02f0a2177c9f32fc6f24fbb0bf84aa7c923d9fe55496fd5041ec737165e810e2a695fa

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    35KB

    MD5

    f4e7a311a302b2a016b872e1d9ed0329

    SHA1

    0e29a3a55eb07aafb23ea78a7b3dc3f074e214b4

    SHA256

    d698820357f6531cbdd847f44139a47bbf8a46ee9d6baa18bd8376c407d0646d

    SHA512

    cbb317a22698747252f1e033e3e272b73b4419086fbae331fd3d6fe0974091825479a13294b16a3741a61e24c99862575e28c1e1c090eef5ea39a65fe8d3d62a

  • memory/1568-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1568-7-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1960-19-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1960-23-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4004-4-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4004-8-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4004-11-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4004-14-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4004-15-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4004-22-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB