Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2024, 15:17 UTC
Static task
static1
Behavioral task
behavioral1
Sample
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
Resource
win7-20240708-en
General
-
Target
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
-
Size
96KB
-
MD5
efc206b3300e3e58bcf3ca8eaca8c9cf
-
SHA1
712605a02fb689f2191342e67cb902ad52556c51
-
SHA256
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d
-
SHA512
94f0162cc032d7a8ed0924037168222936d9daeba5bd4b015850fb8c1057fd841e0cc702fd5a5c33fa02e05dca8d6977565c0482615c9a6129185f23c8d95399
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:UGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 228 omsecor.exe 4656 omsecor.exe 1860 omsecor.exe 2440 omsecor.exe 4376 omsecor.exe 1140 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3752 set thread context of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 228 set thread context of 4656 228 omsecor.exe 87 PID 1860 set thread context of 2440 1860 omsecor.exe 108 PID 4376 set thread context of 1140 4376 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 396 3752 WerFault.exe 82 2004 228 WerFault.exe 86 2996 1860 WerFault.exe 107 2612 4376 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 3752 wrote to memory of 2944 3752 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 83 PID 2944 wrote to memory of 228 2944 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 86 PID 2944 wrote to memory of 228 2944 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 86 PID 2944 wrote to memory of 228 2944 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 86 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 228 wrote to memory of 4656 228 omsecor.exe 87 PID 4656 wrote to memory of 1860 4656 omsecor.exe 107 PID 4656 wrote to memory of 1860 4656 omsecor.exe 107 PID 4656 wrote to memory of 1860 4656 omsecor.exe 107 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 1860 wrote to memory of 2440 1860 omsecor.exe 108 PID 2440 wrote to memory of 4376 2440 omsecor.exe 110 PID 2440 wrote to memory of 4376 2440 omsecor.exe 110 PID 2440 wrote to memory of 4376 2440 omsecor.exe 110 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112 PID 4376 wrote to memory of 1140 4376 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exeC:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 2568⤵
- Program crash
PID:2612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 2926⤵
- Program crash
PID:2996
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 3004⤵
- Program crash
PID:2004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 2882⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3752 -ip 37521⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 228 -ip 2281⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1860 -ip 18601⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4376 -ip 43761⤵PID:5108
Network
-
Remote address:8.8.8.8:53Requestlousta.netIN AResponselousta.netIN A193.166.255.171
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request133.130.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request53.210.109.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request180.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestmkkuei4kdsz.comIN AResponsemkkuei4kdsz.comIN A3.33.243.145mkkuei4kdsz.comIN A15.197.204.56
-
Remote address:3.33.243.145:80RequestGET /398/916.html HTTP/1.1
From: 133784038596085878
Via: dlngfrn[rfs=8-5_`oeb=6[pboan:11-0102_ls>321.^lby>_94a6f205`6e0d:/c7084^b1.f1278-9
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
date: Wed, 11 Dec 2024 15:18:43 GMT
content-length: 114
-
Remote address:8.8.8.8:53Request145.243.33.3.in-addr.arpaIN PTRResponse145.243.33.3.in-addr.arpaIN PTRa3edc0dabdef92d6dawsglobalacceleratorcom
-
Remote address:8.8.8.8:53Request20.49.80.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestow5dirasuek.comIN AResponseow5dirasuek.comIN A52.34.198.229
-
Remote address:52.34.198.229:80RequestGET /1/545.html HTTP/1.1
From: 133784038596085878
Via: dlngfrn[rfs=8-5_`oeb=6[pboan:11-0102_ls>321.^lby>_94a6f205`6e0d:/c7084^b1.f1278-9
Host: ow5dirasuek.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Wed, 11 Dec 2024 15:18:54 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=781d2e7ca774ba30a076834ee7ff84f3|181.215.176.83|1733930334|1733930334|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:8.8.8.8:53Request229.198.34.52.in-addr.arpaIN PTRResponse229.198.34.52.in-addr.arpaIN PTRec2-52-34-198-229 us-west-2compute amazonawscom
-
Remote address:8.8.8.8:53Requestlousta.netIN AResponselousta.netIN A193.166.255.171
-
Remote address:3.33.243.145:80RequestGET /603/128.html HTTP/1.1
From: 133784038596085878
Via: dlngfrn[rfs=8-5_`oeb=6[pboan:11-0102_ls>321.^lby>be50af04625538g^d300c`1bc0e415c9
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
date: Wed, 11 Dec 2024 15:20:07 GMT
content-length: 114
-
260 B 5
-
260 B 5
-
467 B 388 B 6 4
HTTP Request
GET http://mkkuei4kdsz.com/398/916.htmlHTTP Response
200 -
465 B 623 B 6 5
HTTP Request
GET http://ow5dirasuek.com/1/545.htmlHTTP Response
200 -
260 B 5
-
260 B 5
-
375 B 348 B 4 3
HTTP Request
GET http://mkkuei4kdsz.com/603/128.htmlHTTP Response
200
-
56 B 72 B 1 1
DNS Request
lousta.net
DNS Response
193.166.255.171
-
213 B 157 B 3 1
DNS Request
13.86.106.20.in-addr.arpa
DNS Request
13.86.106.20.in-addr.arpa
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
133.130.81.91.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
0.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
53.210.109.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
180.129.81.91.in-addr.arpa
-
61 B 93 B 1 1
DNS Request
mkkuei4kdsz.com
DNS Response
3.33.243.14515.197.204.56
-
71 B 127 B 1 1
DNS Request
145.243.33.3.in-addr.arpa
-
70 B 145 B 1 1
DNS Request
20.49.80.91.in-addr.arpa
-
61 B 77 B 1 1
DNS Request
ow5dirasuek.com
DNS Response
52.34.198.229
-
72 B 135 B 1 1
DNS Request
229.198.34.52.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
lousta.net
DNS Response
193.166.255.171
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5fc78e4015ef026712b9fc22f7f5408ba
SHA1ddfcebb6cbe4b9a05fdada499dffaa44a7d367f4
SHA256ab85b48900f104daf368a1fe1894122a653e9db0a7b1bbc4929832dcf4ee61ca
SHA5125ac2d4de07fdd0539cb45603eb89cee3e538cc5a0e6ab0a02ba3b458df1bd97de38d213dfb199086e666d7306c11f437b812f6455222a01e4e48e7bcd5a874a8
-
Filesize
96KB
MD5f68ee74f31d1013e365ab5ce17f6a80d
SHA1855a9adb872d0e86afa7bcc5644d9cd1d504cd88
SHA2561d2e864b46c759be0946582d45a2b72e2020b7246469abdc96cb9fea7b4df94c
SHA5123d7acd7c613c2a5185132ba5388da33be1532302565d8e2a80deee6d28bb5edf72550ee299ea9db312a24311cb139c410bd7d3ccf02c705adffab99650f46194
-
Filesize
96KB
MD54894333d751ca2735ce7989d41b0494c
SHA1bb6cfd92c012187bee52d826987723e48814b231
SHA256cdf8085ada94a11621701cea5ff45086ed89af703050ee00933547ceed44438c
SHA5128fdd02f6df78a21982b69036b52db5daf736af496c46faa55d630d612b178a62702426722bd92505d292f259766e2f7ba8b091c30318e3794c1dbc97ffc4e708