Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2024, 02:16
Behavioral task
behavioral1
Sample
bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe
Resource
win7-20240903-en
General
-
Target
bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe
-
Size
92KB
-
MD5
56e1c906484e85cd017c86523997c2c0
-
SHA1
03515d7daf2de0cd0d086b586d6f549c0c1718f6
-
SHA256
bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faa
-
SHA512
41575b84f49db275a78ebd7f32371b982bb5e0aef349b8d333435322a01491ffc48337bebb563ca340e975eea5601420cb0018389b6803ba23e11d729d5fc739
-
SSDEEP
1536:sd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5f:UdseIOyEZEyFjEOFqTiQm5l/5f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3572 omsecor.exe 5068 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4260 wrote to memory of 3572 4260 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 82 PID 4260 wrote to memory of 3572 4260 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 82 PID 4260 wrote to memory of 3572 4260 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 82 PID 3572 wrote to memory of 5068 3572 omsecor.exe 92 PID 3572 wrote to memory of 5068 3572 omsecor.exe 92 PID 3572 wrote to memory of 5068 3572 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe"C:\Users\Admin\AppData\Local\Temp\bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD58c74992642118d344eccee0b204c2cb1
SHA1358e9af5788f04c9d3c79d7915df96592b69b75f
SHA2565f5fb512d520e54839f4c44f5f8469982b5ceac9a137d0b26f7d0450454e76ee
SHA5129e0e33ccc85880ca06e797eb432f43c2c90351f2e1ff3636a071948595715d83b0f3e4f0b3fffcf1bae180d77f060d076493dd206fde6f440a2782a310a6d078
-
Filesize
92KB
MD5ef12a9c190d27d92fcc82fa7f1a45594
SHA1de7a0d57c90935436dfc93340a0aac69df2961b5
SHA2568f5c5ac99fee07d211d8dd870aa79c2818cae92bd302324954126588f6abef4f
SHA51272b048978922375a86a8c10655e10502dcbbc3acfbfe3c84f69e629d8052d72b11cb4e5ea275c2e381296c0a373e11f6a72647c69232d2feed14c5d4e0e1c5ca