Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/12/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
Resource
win7-20240903-en
General
-
Target
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
-
Size
96KB
-
MD5
809d8bedb2da450b588bf82e9a118fe4
-
SHA1
5cb2c9863ddc2ba5346967bf0780554c8dc120f9
-
SHA256
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72
-
SHA512
4768075e7c02683f09e9d23339b5a69724c3439c711244c7761f9ceaf44f7c4a6d8b1189ab47214e4aa4a27e1fad1f07b4be4d3d374c87326611fc68be378287
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:hGs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2320 omsecor.exe 1944 omsecor.exe 628 omsecor.exe 1780 omsecor.exe 2968 omsecor.exe 2124 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2616 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 2616 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 2320 omsecor.exe 1944 omsecor.exe 1944 omsecor.exe 1780 omsecor.exe 1780 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1648 set thread context of 2616 1648 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2320 set thread context of 1944 2320 omsecor.exe 33 PID 628 set thread context of 1780 628 omsecor.exe 37 PID 2968 set thread context of 2124 2968 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2616 1648 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 1648 wrote to memory of 2616 1648 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 1648 wrote to memory of 2616 1648 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 1648 wrote to memory of 2616 1648 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 1648 wrote to memory of 2616 1648 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 1648 wrote to memory of 2616 1648 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2616 wrote to memory of 2320 2616 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2616 wrote to memory of 2320 2616 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2616 wrote to memory of 2320 2616 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2616 wrote to memory of 2320 2616 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2320 wrote to memory of 1944 2320 omsecor.exe 33 PID 2320 wrote to memory of 1944 2320 omsecor.exe 33 PID 2320 wrote to memory of 1944 2320 omsecor.exe 33 PID 2320 wrote to memory of 1944 2320 omsecor.exe 33 PID 2320 wrote to memory of 1944 2320 omsecor.exe 33 PID 2320 wrote to memory of 1944 2320 omsecor.exe 33 PID 1944 wrote to memory of 628 1944 omsecor.exe 36 PID 1944 wrote to memory of 628 1944 omsecor.exe 36 PID 1944 wrote to memory of 628 1944 omsecor.exe 36 PID 1944 wrote to memory of 628 1944 omsecor.exe 36 PID 628 wrote to memory of 1780 628 omsecor.exe 37 PID 628 wrote to memory of 1780 628 omsecor.exe 37 PID 628 wrote to memory of 1780 628 omsecor.exe 37 PID 628 wrote to memory of 1780 628 omsecor.exe 37 PID 628 wrote to memory of 1780 628 omsecor.exe 37 PID 628 wrote to memory of 1780 628 omsecor.exe 37 PID 1780 wrote to memory of 2968 1780 omsecor.exe 38 PID 1780 wrote to memory of 2968 1780 omsecor.exe 38 PID 1780 wrote to memory of 2968 1780 omsecor.exe 38 PID 1780 wrote to memory of 2968 1780 omsecor.exe 38 PID 2968 wrote to memory of 2124 2968 omsecor.exe 39 PID 2968 wrote to memory of 2124 2968 omsecor.exe 39 PID 2968 wrote to memory of 2124 2968 omsecor.exe 39 PID 2968 wrote to memory of 2124 2968 omsecor.exe 39 PID 2968 wrote to memory of 2124 2968 omsecor.exe 39 PID 2968 wrote to memory of 2124 2968 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exeC:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56e897a612472ad8b51062a6844a8a17b
SHA15c4ba9ffcfbe52029f8bfadb883764b723d3fd38
SHA2560360e1344a1faf0e855e4798bb824e5492159b6c35b83f1cf43024a9bbc1adf9
SHA51253e606db7f73e85a5f0b269747d938ac07e3abf32d601fcb4ef89f4a8804340b3354887b9e65bed6ac3be8c338e236bf81c493cefdca2feeee2c3f0edc809ed8
-
Filesize
96KB
MD5334dc7960fe04bb1ef1e223fece2877d
SHA1bfe1325225607b5f6460ea1aba3b3c818612cacd
SHA2568abb77325ba5da305300b4921ab704cafa9c37d8fe41e3c5c2635dd9ca34203c
SHA512e64e851fdc01ff658f18eb28f865b63c35973ff37f10ad9b33e4bcda2ad2e0880cf0bec637c4411e3816a4c5c7dbcd555bc1d975fc5003de0c4eded2f7d2c978
-
Filesize
96KB
MD50296865683d66b81f427b139b9c26c6b
SHA13cdaa16300dec5a165189ca43daaebfa27077759
SHA256fd692bb9c663155098775b6563470948febb232a5982b0099fc102a646dc6f9d
SHA512cff51385c8fa48a75b0997ba75e28377208ec535c68b4b96c7fef246e76a496372a2e84af7cb86536aec87803010b8723381e9df5859913768377a5e94914649