Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/12/2024, 03:07 UTC
Behavioral task
behavioral1
Sample
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe
Resource
win7-20240903-en
General
-
Target
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe
-
Size
90KB
-
MD5
d1cbebb87a50f19ebe40d068ab9b2e3a
-
SHA1
1a40cc5fb7be80577cc1eabd53a48e6d8d64c4ea
-
SHA256
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810
-
SHA512
c10eb92a6879effb6c9502eaafb327857f918cc0b820dc1015a072e55eaf3aaa37a9df13e857bca0145e0621989d586e1b6bd6727c5b16ed5f3630d6fabb439d
-
SSDEEP
768:EMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:EbIvYvZEyFKF6N4aS5AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1020 omsecor.exe 2148 omsecor.exe 2196 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3016 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 3016 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 1020 omsecor.exe 1020 omsecor.exe 2148 omsecor.exe 2148 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1020 3016 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 30 PID 3016 wrote to memory of 1020 3016 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 30 PID 3016 wrote to memory of 1020 3016 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 30 PID 3016 wrote to memory of 1020 3016 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 30 PID 1020 wrote to memory of 2148 1020 omsecor.exe 33 PID 1020 wrote to memory of 2148 1020 omsecor.exe 33 PID 1020 wrote to memory of 2148 1020 omsecor.exe 33 PID 1020 wrote to memory of 2148 1020 omsecor.exe 33 PID 2148 wrote to memory of 2196 2148 omsecor.exe 34 PID 2148 wrote to memory of 2196 2148 omsecor.exe 34 PID 2148 wrote to memory of 2196 2148 omsecor.exe 34 PID 2148 wrote to memory of 2196 2148 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe"C:\Users\Admin\AppData\Local\Temp\d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
Network
-
Remote address:8.8.8.8:53Requestlousta.netIN AResponselousta.netIN A193.166.255.171
-
Remote address:193.166.255.171:80RequestGET /424/225.html HTTP/1.1
From: 133797424502520000
Via: ckmfeqmZqer<7,4^_nda<5Zoan`m900,/0/1^kr=201-]kax=b54-/05c6.db-d55`74c9]df444.cb13
Host: lousta.net
Connection: Keep-Alive
-
Remote address:8.8.8.8:53Requestmkkuei4kdsz.comIN AResponsemkkuei4kdsz.comIN A15.197.204.56mkkuei4kdsz.comIN A3.33.243.145
-
Remote address:15.197.204.56:80RequestGET /281/818.html HTTP/1.1
From: 133797424502520000
Via: ckmfeqmZqer<7,4^_nda<5Zoan`m900,/0/1^kr=201-]kax=b54-/05c6.db-d55`74c9]df444.cb13
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
date: Fri, 27 Dec 2024 03:08:33 GMT
content-length: 114
-
Remote address:8.8.8.8:53Requestow5dirasuek.comIN AResponseow5dirasuek.comIN A52.34.198.229
-
Remote address:52.34.198.229:80RequestGET /933/833.html HTTP/1.1
From: 133797424502520000
Via: ckmfeqmZqer<7,4^_nda<5Zoan`m900,/0/1^kr=201-]kax=b54-/05c6.db-d55`74c9]df444.cb13
Host: ow5dirasuek.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Fri, 27 Dec 2024 03:08:43 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=d01ff2e71cfecfd5261bffece1df0856|181.215.176.83|1735268923|1735268923|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:15.197.204.56:80RequestGET /745/973.html HTTP/1.1
From: 133797424502520000
Via: ckmfeqmZqer<7,4^_nda<5Zoan`m900,/0/1^kr=201-]kax=b54-/05c6.db-d55`74c9]df444.cb13
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
date: Fri, 27 Dec 2024 03:09:56 GMT
content-length: 114
-
324 B 132 B 3 3
HTTP Request
GET http://lousta.net/424/225.html -
152 B 3
-
152 B 3
-
473 B 644 B 6 5
HTTP Request
GET http://mkkuei4kdsz.com/281/818.htmlHTTP Response
200 -
421 B 631 B 5 5
HTTP Request
GET http://ow5dirasuek.com/933/833.htmlHTTP Response
200 -
152 B 3
-
152 B 3
-
427 B 604 B 5 4
HTTP Request
GET http://mkkuei4kdsz.com/745/973.htmlHTTP Response
200
-
56 B 72 B 1 1
DNS Request
lousta.net
DNS Response
193.166.255.171
-
61 B 93 B 1 1
DNS Request
mkkuei4kdsz.com
DNS Response
15.197.204.563.33.243.145
-
61 B 77 B 1 1
DNS Request
ow5dirasuek.com
DNS Response
52.34.198.229
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5721838d0dc55b0715421fc9940d76768
SHA1ff6838e5b2ba34bdcb9ff88231ceb593eabddd22
SHA2561a3f84f95b4006f44fe8c289ee62a578338644765549ddc10375237a8ad69e67
SHA512bc6588183d2e728d39e32bcb86821f09a526884db9666cc7b05a9705cbaaa096ba72619579201f8fa4ea7de69bb3c0d399f318ee5c4f6566e417f225afb24c73
-
Filesize
90KB
MD56ba426446de78e3ed07c8211f028ef8b
SHA1835beafbc008cac4e94cb03dd9d808d315479d90
SHA2565a9ffa467ee5aa96a1e70ad7e0daafc66f6fa147202f7f412c48b9e7a32c0084
SHA512d30f804f290e3f628be0e495acd6fc584d877746538f498432fe5958b33fda1a38465246044879eaae7c699855fbe6a568b416df50dd493f356a198ab1e0d531
-
Filesize
90KB
MD5c7ec0306559a7c7010c3ad0bab1c2423
SHA19517a0c6f67a223876a7ed0a46f8373f152e0239
SHA256e47748b5eae34994ec464db5149c8c2c44417efebe5568f327ef51b957b0ed0d
SHA5124bcbbb40ea96b2e2958a112a3b64e86d7c37c81f4e12fccf61a2b0fd3aecdd181fb82809c5cd8d7feadffecc55626878c7a2a23cd74a6ea58789997692f28bdb