Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe
Resource
win7-20240903-en
General
-
Target
6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe
-
Size
96KB
-
MD5
83f7b311b9ecda871573dcf6e7440124
-
SHA1
0416d1d3ca34bc17eea652db45f47e492ce0afb0
-
SHA256
6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c
-
SHA512
9305f3e807816b7f333b183b1b2887798f2cde555c99a50915c75f5de4121c9647888ea7d49e300834904e72126e537ed5f62b249d8f08e234255588f8a62e79
-
SSDEEP
1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxa:jGs8cd8eXlYairZYqMddH13a
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2792 omsecor.exe 2132 omsecor.exe 2836 omsecor.exe 564 omsecor.exe 1408 omsecor.exe 2204 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3068 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 3068 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 2792 omsecor.exe 2132 omsecor.exe 2132 omsecor.exe 564 omsecor.exe 564 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2640 set thread context of 3068 2640 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 30 PID 2792 set thread context of 2132 2792 omsecor.exe 32 PID 2836 set thread context of 564 2836 omsecor.exe 36 PID 1408 set thread context of 2204 1408 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2640 wrote to memory of 3068 2640 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 30 PID 2640 wrote to memory of 3068 2640 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 30 PID 2640 wrote to memory of 3068 2640 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 30 PID 2640 wrote to memory of 3068 2640 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 30 PID 2640 wrote to memory of 3068 2640 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 30 PID 2640 wrote to memory of 3068 2640 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 30 PID 3068 wrote to memory of 2792 3068 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 31 PID 3068 wrote to memory of 2792 3068 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 31 PID 3068 wrote to memory of 2792 3068 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 31 PID 3068 wrote to memory of 2792 3068 6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe 31 PID 2792 wrote to memory of 2132 2792 omsecor.exe 32 PID 2792 wrote to memory of 2132 2792 omsecor.exe 32 PID 2792 wrote to memory of 2132 2792 omsecor.exe 32 PID 2792 wrote to memory of 2132 2792 omsecor.exe 32 PID 2792 wrote to memory of 2132 2792 omsecor.exe 32 PID 2792 wrote to memory of 2132 2792 omsecor.exe 32 PID 2132 wrote to memory of 2836 2132 omsecor.exe 35 PID 2132 wrote to memory of 2836 2132 omsecor.exe 35 PID 2132 wrote to memory of 2836 2132 omsecor.exe 35 PID 2132 wrote to memory of 2836 2132 omsecor.exe 35 PID 2836 wrote to memory of 564 2836 omsecor.exe 36 PID 2836 wrote to memory of 564 2836 omsecor.exe 36 PID 2836 wrote to memory of 564 2836 omsecor.exe 36 PID 2836 wrote to memory of 564 2836 omsecor.exe 36 PID 2836 wrote to memory of 564 2836 omsecor.exe 36 PID 2836 wrote to memory of 564 2836 omsecor.exe 36 PID 564 wrote to memory of 1408 564 omsecor.exe 37 PID 564 wrote to memory of 1408 564 omsecor.exe 37 PID 564 wrote to memory of 1408 564 omsecor.exe 37 PID 564 wrote to memory of 1408 564 omsecor.exe 37 PID 1408 wrote to memory of 2204 1408 omsecor.exe 38 PID 1408 wrote to memory of 2204 1408 omsecor.exe 38 PID 1408 wrote to memory of 2204 1408 omsecor.exe 38 PID 1408 wrote to memory of 2204 1408 omsecor.exe 38 PID 1408 wrote to memory of 2204 1408 omsecor.exe 38 PID 1408 wrote to memory of 2204 1408 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe"C:\Users\Admin\AppData\Local\Temp\6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exeC:\Users\Admin\AppData\Local\Temp\6efa63841489e7447c94debcbddac71bb973e16204e3334542bff3b6cd004a0c.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d5b78477f5e09b3f066598c50c7223c7
SHA12d413f16a0a80825b60bb9f8bec0328c85750652
SHA256a67acd902fefe91943234d5bb633741c178006f52a8d4df83df346d4ab3cb653
SHA512febec632115bc7e96e8c0c8e9f0c142bb1512d84f54639e8c6c9bdac6214abccd4f698c8ced156fca3afa5efc9b9cd5dc9fcdc4dfe75cba2ee5e366dda282d19
-
Filesize
96KB
MD5c27d1678ca7e90c2de7398bf86791b31
SHA1679cd60805b75b26b5b63b12702b5765938b6e48
SHA256127958c2e7ecc1ddeec200407c2e50a4b8a7a96c55a1f6629686769417ace5ce
SHA51252016640a42a058715b2029d3a7d1a17c46549cecc2861b042ad83a02aad327aa7d3bf2df3a06d6d75a37afde7a9d252a05b2c8cbe8e5810be6c1acd54ddf809
-
Filesize
96KB
MD507881973bc9e356c0d7addf84d1fbb61
SHA1cd40b5f0a3112a6316259ff7ff75013708121612
SHA2569bfd773bbbfd61adab467c7b7a2f49ee5f4ebe1e78e6f7bdabc2efd1fbbbee63
SHA5124c224e800f00c16033e4c0b4acd91a811a1b04efe496dc19fe865fef73e0cad2ca0c16d1c26fe5927962d2bbde0ae521ce36572da191006d7981ff270b1d6996