Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2024, 08:10 UTC
Behavioral task
behavioral1
Sample
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe
Resource
win7-20240903-en
General
-
Target
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe
-
Size
80KB
-
MD5
de95f56d652d6d483f6d2c86b5d585d4
-
SHA1
bbb0630319bbc561b9bb85f40feec39957a10dac
-
SHA256
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98
-
SHA512
24ce35bdbbdb323ef8403db13ed92d43d4ad25bdc80ce5570b3046bf41edefb99c8061714f63153cf959deb899daddd59d65a13e5c1298ca257a8100eea521df
-
SSDEEP
1536:Id9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzx:4dseIOMEZEyFjEOFqTiQmOl/5xPvwd
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4848 omsecor.exe 1716 omsecor.exe 4600 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3716 wrote to memory of 4848 3716 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 83 PID 3716 wrote to memory of 4848 3716 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 83 PID 3716 wrote to memory of 4848 3716 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 83 PID 4848 wrote to memory of 1716 4848 omsecor.exe 100 PID 4848 wrote to memory of 1716 4848 omsecor.exe 100 PID 4848 wrote to memory of 1716 4848 omsecor.exe 100 PID 1716 wrote to memory of 4600 1716 omsecor.exe 101 PID 1716 wrote to memory of 4600 1716 omsecor.exe 101 PID 1716 wrote to memory of 4600 1716 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe"C:\Users\Admin\AppData\Local\Temp\6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4600
-
-
-
Network
-
Remote address:8.8.8.8:53Requestlousta.netIN AResponselousta.netIN A193.166.255.171
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request149.220.183.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request75.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestmkkuei4kdsz.comIN AResponsemkkuei4kdsz.comIN A3.33.243.145mkkuei4kdsz.comIN A15.197.204.56
-
Remote address:3.33.243.145:80RequestGET /835/486.html HTTP/1.1
From: 133796742283625322
Via: emohgso\sgt>9.6`apfc>7\qcpbo;22.1213`mt?432/_mcz?4f7cg6a292:ed5h.c:be82362g:a:g7e
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
date: Thu, 26 Dec 2024 08:11:32 GMT
content-length: 114
-
Remote address:8.8.8.8:53Request145.243.33.3.in-addr.arpaIN PTRResponse145.243.33.3.in-addr.arpaIN PTRa3edc0dabdef92d6dawsglobalacceleratorcom
-
Remote address:8.8.8.8:53Requestow5dirasuek.comIN AResponseow5dirasuek.comIN A52.34.198.229
-
Remote address:52.34.198.229:80RequestGET /438/115.html HTTP/1.1
From: 133796742283625322
Via: emohgso\sgt>9.6`apfc>7\qcpbo;22.1213`mt?432/_mcz?4f7cg6a292:ed5h.c:be82362g:a:g7e
Host: ow5dirasuek.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Thu, 26 Dec 2024 08:11:42 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=7effa5b554638e800cd391fee9df0dc8|181.215.176.83|1735200702|1735200702|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:8.8.8.8:53Request229.198.34.52.in-addr.arpaIN PTRResponse229.198.34.52.in-addr.arpaIN PTRec2-52-34-198-229 us-west-2compute amazonawscom
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:3.33.243.145:80RequestGET /685/30.html HTTP/1.1
From: 133796742283625322
Via: emohgso\sgt>9.6`apfc>7\qcpbo;22.1213`mt?432/_mcz?4f7cg6a292:ed5h.c:be82362g:a:g7e
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
date: Thu, 26 Dec 2024 08:12:55 GMT
content-length: 114
-
260 B 5
-
260 B 5
-
467 B 388 B 6 4
HTTP Request
GET http://mkkuei4kdsz.com/835/486.htmlHTTP Response
200 -
467 B 623 B 6 5
HTTP Request
GET http://ow5dirasuek.com/438/115.htmlHTTP Response
200 -
260 B 5
-
260 B 5
-
374 B 348 B 4 3
HTTP Request
GET http://mkkuei4kdsz.com/685/30.htmlHTTP Response
200
-
56 B 72 B 1 1
DNS Request
lousta.net
DNS Response
193.166.255.171
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
149.220.183.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
75.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
61 B 93 B 1 1
DNS Request
mkkuei4kdsz.com
DNS Response
3.33.243.14515.197.204.56
-
71 B 127 B 1 1
DNS Request
145.243.33.3.in-addr.arpa
-
61 B 77 B 1 1
DNS Request
ow5dirasuek.com
DNS Response
52.34.198.229
-
72 B 135 B 1 1
DNS Request
229.198.34.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD590f970d06987a346d26b02ed6c74815c
SHA18d78087fd6ebe439b552505400600a34c5777b95
SHA256ffbdfab572ba38021a574837077e0eb6c2c69118255a8251c354ba5034ec17a5
SHA5128efc85c9e4309eb9404084db520d6564c5042d980b796e0335921295702a6218057f249e6054cde8ab5a256ace4617f60387deafe94c578398fc7582c9bc60cd
-
Filesize
80KB
MD503be010ef5cb0587a786725364168a44
SHA18f029fccde27c604f1e41538fff1e3edaee8f42e
SHA256e0421e9086c04d3e83b998a4b5653a4c71099d3ed688525599bdc6ee49dbdde7
SHA512e85972d4d42eecf3770eff8413141b29003e0a723c88266de4a6a13f1137e8f87c3834f7599d9380dc8e88dd070a1f62a15ba1890152c318f7f308d6d67e9d12
-
Filesize
80KB
MD50f84a285da1addd14a52529fb358d829
SHA148c52da47ec05feaf776c496fe3ecfa818cb2d2d
SHA2569398c1da2ba52cb1f08b72ee6e030e346bff0d984d23f30916188407ed8e0012
SHA5127f576b4f9d357996cab473f644ef66b6aa7af2a478799d8331609f02d90b805771c6ada763706a731cf14a50b13cfed789fccd6d4e443268123c793f54823afa