Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/12/2024, 04:44
Behavioral task
behavioral1
Sample
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe
Resource
win7-20240903-en
General
-
Target
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe
-
Size
76KB
-
MD5
2b07ebed6c3cb422b0282d9e1a54037c
-
SHA1
6bde080396fdb0e8ac34a665519e6473b53fd964
-
SHA256
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac
-
SHA512
9a4ff2373e5dbda86ac3ac7d0dd05871e39a85db039cdf8311a62c4784f67ea847ceea7c46278756050df03980539d752624494792fdc2ac351c0c620d422c1e
-
SSDEEP
768:gMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWr:gbIvYvZEyFKF6N4yS+AQmZTl/5Or
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1216 omsecor.exe 4136 omsecor.exe 1588 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1088 wrote to memory of 1216 1088 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 83 PID 1088 wrote to memory of 1216 1088 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 83 PID 1088 wrote to memory of 1216 1088 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 83 PID 1216 wrote to memory of 4136 1216 omsecor.exe 101 PID 1216 wrote to memory of 4136 1216 omsecor.exe 101 PID 1216 wrote to memory of 4136 1216 omsecor.exe 101 PID 4136 wrote to memory of 1588 4136 omsecor.exe 102 PID 4136 wrote to memory of 1588 4136 omsecor.exe 102 PID 4136 wrote to memory of 1588 4136 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe"C:\Users\Admin\AppData\Local\Temp\f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD524dbf39c272380ce64181cda099b6c07
SHA1594359bc43e1abd2d32658f3e66363003930b971
SHA2565cb5232f477d916784a807250e90e7b4fc15c816b6e0f3211dd83b74c74a1c58
SHA512fdf16350160db6091538eacb6d9d417a1ddcba33131d084ce61a6dc468e8d9cb74b0fd561af454382634f69d0d94148622a3355233ba602fb5f9b914974788b4
-
Filesize
76KB
MD5ace68b1292f3c41f54e0154cdcdd82fc
SHA1e44b82bc2e4e06647cd9021a3d58de9b1b4f6882
SHA2565145786012d333510feeeb81c4c3115949a56e327a3eda440de6738665fd923e
SHA51289e01fe097fc2a7ccaef4f95e158f7e844f18982c09aa206a222f798e7458b41901ee2e4b7c02b1c1447079ed99f467eee8ce8cfac1839f699c818c78b4814d9
-
Filesize
76KB
MD5ac213683bcaccb82c9de67e3c48e9d09
SHA10a28e00393b03920e4b7d8587544b0e299931b38
SHA256fd9601a23b57c146343517a11e00c3714ebf1582dc2b5c4db92261d0450e7be1
SHA512a5e777889c60ef30a1700b8cc013e7befc0ac3fe3a29aa9372746e289f0c4f988d85f2eff1a0ce8f97af3022a45a16f96860a406d700268379eb2a1be7fd4334