Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/12/2024, 15:17 UTC

General

  • Target

    7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe

  • Size

    96KB

  • MD5

    efc206b3300e3e58bcf3ca8eaca8c9cf

  • SHA1

    712605a02fb689f2191342e67cb902ad52556c51

  • SHA256

    7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d

  • SHA512

    94f0162cc032d7a8ed0924037168222936d9daeba5bd4b015850fb8c1057fd841e0cc702fd5a5c33fa02e05dca8d6977565c0482615c9a6129185f23c8d95399

  • SSDEEP

    1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:UGs8cd8eXlYairZYqMddH13z

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
    "C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3752
    • C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
      C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:228
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4656
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2440
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4376
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1140
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 256
                  8⤵
                  • Program crash
                  PID:2612
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 292
              6⤵
              • Program crash
              PID:2996
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 300
          4⤵
          • Program crash
          PID:2004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 288
      2⤵
      • Program crash
      PID:396
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3752 -ip 3752
    1⤵
      PID:1840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 228 -ip 228
      1⤵
        PID:4528
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1860 -ip 1860
        1⤵
          PID:2644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4376 -ip 4376
          1⤵
            PID:5108

          Network

          • flag-us
            DNS
            lousta.net
            omsecor.exe
            Remote address:
            8.8.8.8:53
            Request
            lousta.net
            IN A
            Response
            lousta.net
            IN A
            193.166.255.171
          • flag-us
            DNS
            13.86.106.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            13.86.106.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            13.86.106.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            13.86.106.20.in-addr.arpa
            IN PTR
          • flag-us
            DNS
            13.86.106.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            13.86.106.20.in-addr.arpa
            IN PTR
          • flag-us
            DNS
            133.130.81.91.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            133.130.81.91.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            0.159.190.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            0.159.190.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            95.221.229.192.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            95.221.229.192.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            97.17.167.52.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            97.17.167.52.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            217.106.137.52.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            217.106.137.52.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            58.55.71.13.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            58.55.71.13.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            53.210.109.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            53.210.109.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            198.187.3.20.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            198.187.3.20.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            180.129.81.91.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            180.129.81.91.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            mkkuei4kdsz.com
            omsecor.exe
            Remote address:
            8.8.8.8:53
            Request
            mkkuei4kdsz.com
            IN A
            Response
            mkkuei4kdsz.com
            IN A
            3.33.243.145
            mkkuei4kdsz.com
            IN A
            15.197.204.56
          • flag-us
            GET
            http://mkkuei4kdsz.com/398/916.html
            omsecor.exe
            Remote address:
            3.33.243.145:80
            Request
            GET /398/916.html HTTP/1.1
            From: 133784038596085878
            Via: dlngfrn[rfs=8-5_`oeb=6[pboan:11-0102_ls>321.^lby>_94a6f205`6e0d:/c7084^b1.f1278-9
            Host: mkkuei4kdsz.com
            Connection: Keep-Alive
            Response
            HTTP/1.1 200 OK
            content-type: text/html
            date: Wed, 11 Dec 2024 15:18:43 GMT
            content-length: 114
          • flag-us
            DNS
            145.243.33.3.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            145.243.33.3.in-addr.arpa
            IN PTR
            Response
            145.243.33.3.in-addr.arpa
            IN PTR
            a3edc0dabdef92d6dawsglobalacceleratorcom
          • flag-us
            DNS
            20.49.80.91.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            20.49.80.91.in-addr.arpa
            IN PTR
            Response
          • flag-us
            DNS
            ow5dirasuek.com
            omsecor.exe
            Remote address:
            8.8.8.8:53
            Request
            ow5dirasuek.com
            IN A
            Response
            ow5dirasuek.com
            IN A
            52.34.198.229
          • flag-us
            GET
            http://ow5dirasuek.com/1/545.html
            omsecor.exe
            Remote address:
            52.34.198.229:80
            Request
            GET /1/545.html HTTP/1.1
            From: 133784038596085878
            Via: dlngfrn[rfs=8-5_`oeb=6[pboan:11-0102_ls>321.^lby>_94a6f205`6e0d:/c7084^b1.f1278-9
            Host: ow5dirasuek.com
            Connection: Keep-Alive
            Response
            HTTP/1.1 200 OK
            Server: nginx
            Date: Wed, 11 Dec 2024 15:18:54 GMT
            Content-Type: text/html
            Transfer-Encoding: chunked
            Connection: close
            Set-Cookie: btst=781d2e7ca774ba30a076834ee7ff84f3|181.215.176.83|1733930334|1733930334|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
            Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
          • flag-us
            DNS
            229.198.34.52.in-addr.arpa
            Remote address:
            8.8.8.8:53
            Request
            229.198.34.52.in-addr.arpa
            IN PTR
            Response
            229.198.34.52.in-addr.arpa
            IN PTR
            ec2-52-34-198-229 us-west-2compute amazonawscom
          • flag-us
            DNS
            lousta.net
            omsecor.exe
            Remote address:
            8.8.8.8:53
            Request
            lousta.net
            IN A
            Response
            lousta.net
            IN A
            193.166.255.171
          • flag-us
            GET
            http://mkkuei4kdsz.com/603/128.html
            omsecor.exe
            Remote address:
            3.33.243.145:80
            Request
            GET /603/128.html HTTP/1.1
            From: 133784038596085878
            Via: dlngfrn[rfs=8-5_`oeb=6[pboan:11-0102_ls>321.^lby>be50af04625538g^d300c`1bc0e415c9
            Host: mkkuei4kdsz.com
            Connection: Keep-Alive
            Response
            HTTP/1.1 200 OK
            content-type: text/html
            date: Wed, 11 Dec 2024 15:20:07 GMT
            content-length: 114
          • 193.166.255.171:80
            lousta.net
            omsecor.exe
            260 B
            5
          • 193.166.255.171:80
            lousta.net
            omsecor.exe
            260 B
            5
          • 3.33.243.145:80
            http://mkkuei4kdsz.com/398/916.html
            http
            omsecor.exe
            467 B
            388 B
            6
            4

            HTTP Request

            GET http://mkkuei4kdsz.com/398/916.html

            HTTP Response

            200
          • 52.34.198.229:80
            http://ow5dirasuek.com/1/545.html
            http
            omsecor.exe
            465 B
            623 B
            6
            5

            HTTP Request

            GET http://ow5dirasuek.com/1/545.html

            HTTP Response

            200
          • 193.166.255.171:80
            lousta.net
            omsecor.exe
            260 B
            5
          • 193.166.255.171:80
            lousta.net
            omsecor.exe
            260 B
            5
          • 3.33.243.145:80
            http://mkkuei4kdsz.com/603/128.html
            http
            omsecor.exe
            375 B
            348 B
            4
            3

            HTTP Request

            GET http://mkkuei4kdsz.com/603/128.html

            HTTP Response

            200
          • 8.8.8.8:53
            lousta.net
            dns
            omsecor.exe
            56 B
            72 B
            1
            1

            DNS Request

            lousta.net

            DNS Response

            193.166.255.171

          • 8.8.8.8:53
            13.86.106.20.in-addr.arpa
            dns
            213 B
            157 B
            3
            1

            DNS Request

            13.86.106.20.in-addr.arpa

            DNS Request

            13.86.106.20.in-addr.arpa

            DNS Request

            13.86.106.20.in-addr.arpa

          • 8.8.8.8:53
            133.130.81.91.in-addr.arpa
            dns
            72 B
            147 B
            1
            1

            DNS Request

            133.130.81.91.in-addr.arpa

          • 8.8.8.8:53
            0.159.190.20.in-addr.arpa
            dns
            71 B
            157 B
            1
            1

            DNS Request

            0.159.190.20.in-addr.arpa

          • 8.8.8.8:53
            95.221.229.192.in-addr.arpa
            dns
            73 B
            144 B
            1
            1

            DNS Request

            95.221.229.192.in-addr.arpa

          • 8.8.8.8:53
            97.17.167.52.in-addr.arpa
            dns
            71 B
            145 B
            1
            1

            DNS Request

            97.17.167.52.in-addr.arpa

          • 8.8.8.8:53
            217.106.137.52.in-addr.arpa
            dns
            73 B
            147 B
            1
            1

            DNS Request

            217.106.137.52.in-addr.arpa

          • 8.8.8.8:53
            58.55.71.13.in-addr.arpa
            dns
            70 B
            144 B
            1
            1

            DNS Request

            58.55.71.13.in-addr.arpa

          • 8.8.8.8:53
            53.210.109.20.in-addr.arpa
            dns
            72 B
            158 B
            1
            1

            DNS Request

            53.210.109.20.in-addr.arpa

          • 8.8.8.8:53
            198.187.3.20.in-addr.arpa
            dns
            71 B
            157 B
            1
            1

            DNS Request

            198.187.3.20.in-addr.arpa

          • 8.8.8.8:53
            180.129.81.91.in-addr.arpa
            dns
            72 B
            147 B
            1
            1

            DNS Request

            180.129.81.91.in-addr.arpa

          • 8.8.8.8:53
            mkkuei4kdsz.com
            dns
            omsecor.exe
            61 B
            93 B
            1
            1

            DNS Request

            mkkuei4kdsz.com

            DNS Response

            3.33.243.145
            15.197.204.56

          • 8.8.8.8:53
            145.243.33.3.in-addr.arpa
            dns
            71 B
            127 B
            1
            1

            DNS Request

            145.243.33.3.in-addr.arpa

          • 8.8.8.8:53
            20.49.80.91.in-addr.arpa
            dns
            70 B
            145 B
            1
            1

            DNS Request

            20.49.80.91.in-addr.arpa

          • 8.8.8.8:53
            ow5dirasuek.com
            dns
            omsecor.exe
            61 B
            77 B
            1
            1

            DNS Request

            ow5dirasuek.com

            DNS Response

            52.34.198.229

          • 8.8.8.8:53
            229.198.34.52.in-addr.arpa
            dns
            72 B
            135 B
            1
            1

            DNS Request

            229.198.34.52.in-addr.arpa

          • 8.8.8.8:53
            lousta.net
            dns
            omsecor.exe
            56 B
            72 B
            1
            1

            DNS Request

            lousta.net

            DNS Response

            193.166.255.171

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            fc78e4015ef026712b9fc22f7f5408ba

            SHA1

            ddfcebb6cbe4b9a05fdada499dffaa44a7d367f4

            SHA256

            ab85b48900f104daf368a1fe1894122a653e9db0a7b1bbc4929832dcf4ee61ca

            SHA512

            5ac2d4de07fdd0539cb45603eb89cee3e538cc5a0e6ab0a02ba3b458df1bd97de38d213dfb199086e666d7306c11f437b812f6455222a01e4e48e7bcd5a874a8

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            f68ee74f31d1013e365ab5ce17f6a80d

            SHA1

            855a9adb872d0e86afa7bcc5644d9cd1d504cd88

            SHA256

            1d2e864b46c759be0946582d45a2b72e2020b7246469abdc96cb9fea7b4df94c

            SHA512

            3d7acd7c613c2a5185132ba5388da33be1532302565d8e2a80deee6d28bb5edf72550ee299ea9db312a24311cb139c410bd7d3ccf02c705adffab99650f46194

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            4894333d751ca2735ce7989d41b0494c

            SHA1

            bb6cfd92c012187bee52d826987723e48814b231

            SHA256

            cdf8085ada94a11621701cea5ff45086ed89af703050ee00933547ceed44438c

            SHA512

            8fdd02f6df78a21982b69036b52db5daf736af496c46faa55d630d612b178a62702426722bd92505d292f259766e2f7ba8b091c30318e3794c1dbc97ffc4e708

          • memory/228-11-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/228-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1140-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1140-55-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1140-58-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1140-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1860-33-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1860-52-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2440-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2440-40-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2440-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2944-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2944-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2944-6-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2944-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3752-19-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3752-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4376-54-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4376-44-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4656-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4656-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4656-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4656-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4656-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4656-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4656-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.