Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/12/2024, 00:11
Behavioral task
behavioral1
Sample
ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113bN.exe
Resource
win7-20240903-en
General
-
Target
ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113bN.exe
-
Size
61KB
-
MD5
d1a84d884bbfaead7b91f455bd5a4b30
-
SHA1
a3fecc074bda03497901af4ca2f5aa2af7714bfb
-
SHA256
ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113b
-
SHA512
23fc7fc73ab018fc73da7afa0af24570c94d85d63f1ee02d4a6fe555ae30cb2f48f9cb7633742fe839fd3063d2305fb7df507406724cf0c9ae1d2583f7688a59
-
SSDEEP
1536:+d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ4l/5/:mdseIOMEZEyFjEOFqTiQmil/5/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2600 omsecor.exe 3004 omsecor.exe 2204 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113bN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 428 wrote to memory of 2600 428 ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113bN.exe 84 PID 428 wrote to memory of 2600 428 ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113bN.exe 84 PID 428 wrote to memory of 2600 428 ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113bN.exe 84 PID 2600 wrote to memory of 3004 2600 omsecor.exe 94 PID 2600 wrote to memory of 3004 2600 omsecor.exe 94 PID 2600 wrote to memory of 3004 2600 omsecor.exe 94 PID 3004 wrote to memory of 2204 3004 omsecor.exe 95 PID 3004 wrote to memory of 2204 3004 omsecor.exe 95 PID 3004 wrote to memory of 2204 3004 omsecor.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113bN.exe"C:\Users\Admin\AppData\Local\Temp\ae5f6a956cafbc0a5fca0abc70bb68797e0551b78b70839a17e213816048113bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD53093e6aa5ccf48ef1460a1d8e8ed13ed
SHA1ca55ce21b410d64d24c1a543ae69174d389cba5f
SHA2561d6399f56c4cba073e932ebc4fe537786ed4008c8e89eabd93481826f082a930
SHA512bc400a9e34393211062513ac154e86548d302553a16ed76607285e2ed25e7dae76aa300e87ea43db68f656dbe96f5a679910256994c5a84edc2e61932e9762a4
-
Filesize
61KB
MD51dfa2b8f6ceaf5481ddeebf64065aa80
SHA12a78d6956fb473151caaf5d0ad8be34ee15bf0e7
SHA2561b03ca368e45d4244f0af844914591d3151fe7cd035ec01d9478666e67a63695
SHA5127dc32278959c480000f38274b7d99179d7b54963ffce627e41a9081c94c6f52c283c5e25236aba68c2bfdcedd03be145e2a0113bdef34629953fb8e944e446e2
-
Filesize
61KB
MD52e222e869b90adf40ec3e5ec0c7c675f
SHA10dd4c42945c5900711a84ce46fdf6679fe3d6532
SHA25680baf0e3e33cfb0d10ae502ac13da0565d94539ebb8cfdada7247b2950700633
SHA512df51c3a2b97c8313a3b2f42b7b06fa9e31e77a8c0d05d0eacd113b654cd141b7b11580fc61f0400bf1a59e50ad649cc7f9918d5e2d39c1f965f30c943ae7cc01