Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2024, 10:54
Behavioral task
behavioral1
Sample
ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029deN.exe
Resource
win7-20240903-en
General
-
Target
ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029deN.exe
-
Size
88KB
-
MD5
8013414be0202eea820daad9a47690d0
-
SHA1
dd16cf45f1271e0e2bf72f47b532adb9e77218f9
-
SHA256
ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029de
-
SHA512
a41ca4617a02c979565225b1c09ef99bdcec0eecd7bc5659273a8d60f6a0252704cbbf0ead39fda66a3d10a0063d5765240676aefb8f0aa5a022ea0118854ac6
-
SSDEEP
768:xMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:xbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2056 omsecor.exe 1808 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029deN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1100 wrote to memory of 2056 1100 ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029deN.exe 82 PID 1100 wrote to memory of 2056 1100 ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029deN.exe 82 PID 1100 wrote to memory of 2056 1100 ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029deN.exe 82 PID 2056 wrote to memory of 1808 2056 omsecor.exe 91 PID 2056 wrote to memory of 1808 2056 omsecor.exe 91 PID 2056 wrote to memory of 1808 2056 omsecor.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029deN.exe"C:\Users\Admin\AppData\Local\Temp\ab7855559df4da13f5dc13771f0fb61467a40f63ef4f11dcde847cf6f31029deN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD553a7ebb62fb8bf7f660618e4b1eeee1c
SHA1a68f54c0f140c348e4ab906121743c49f0de6fd2
SHA2562f088cf814b5ba481f6f778fd714b683edb367b4d08e068f1723c8daba0cb4fb
SHA51250d900e6af0bb7b29beb00abee5b704868fab86138dafecc9c10b9554f98c6830eb636f9bb871e6416e2211b85a0dacb1bb5e07e1f404be466216101c7249b1b
-
Filesize
88KB
MD5155a72df8e46658635ed3f0380e499ca
SHA1ae78cacfcd582667b93379770e47f24e7647b328
SHA256a6d8e1a5674a1194572100cbb7953d0b6afa4acb55f8d62324b5f79cc8220093
SHA512aac9fedebfe92a046d3d7ca9edecfe966cf7a93cd95e12c58bbb9d07d392248c9212335e77cff49c5c26188375a4c5df17ab9b4bb7d3be26b0fc58c15dab679a