Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2024, 05:01
Behavioral task
behavioral1
Sample
5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7N.exe
Resource
win7-20240903-en
General
-
Target
5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7N.exe
-
Size
80KB
-
MD5
99014557fca57e87caf8bc0b2d017360
-
SHA1
ddf4e5972878a2a101a5290acef5da9b285a8c11
-
SHA256
5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7
-
SHA512
b0aa176a40e9370cd106552ad3994fdf56c34416f0905553d52ff80c03659cae5916bb3113eddb1364d791e4ece4ea076d438ae705c4b916720bd158e6a8735a
-
SSDEEP
1536:Id9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:4dseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3004 omsecor.exe 4432 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1112 wrote to memory of 3004 1112 5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7N.exe 82 PID 1112 wrote to memory of 3004 1112 5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7N.exe 82 PID 1112 wrote to memory of 3004 1112 5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7N.exe 82 PID 3004 wrote to memory of 4432 3004 omsecor.exe 92 PID 3004 wrote to memory of 4432 3004 omsecor.exe 92 PID 3004 wrote to memory of 4432 3004 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7N.exe"C:\Users\Admin\AppData\Local\Temp\5fd393289d24ca3bfd9977cc9f0f2cdd1bef9ec6f5a0789c60864ed9dc0a69e7N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5653966adf72b0514c04606788098660a
SHA194beb135cbd3a5b714d19f1abc445ffe449e9629
SHA256aeb491e663cc6ab99328e03a7e44fd6201acc445a73b5f052ad675ded0950ab6
SHA51298af5a9616125fbc2e923deb0735996bde49bc7b168af4abba19ddaa6b95f7cb182caa2fb6eb1d59c63c02a1a7785f8bd924024a70efe6fb6c080bda3cb73187
-
Filesize
80KB
MD5574d2e14261761e323b657be41fbfc30
SHA1abf5fd288016a6032348c4b7ce9a7b487718e182
SHA256f7f2b2352f06c9f7736d7d23471fbe8473d30d1644938bad5e7cb0890dc468a4
SHA512d9b9e026b5a4e13874bf70db196942cd65c5731b60a08fb6bc052dafd6ad74145468bf3de878b2a0f69ba3ee2513f208e06083f10ca6b206ae6c5c0aaef20daf