Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/12/2024, 03:30
Behavioral task
behavioral1
Sample
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe
Resource
win7-20240903-en
General
-
Target
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe
-
Size
80KB
-
MD5
1a3aad5ce62edaf7923bab44dd9d8727
-
SHA1
03a9efa9b7f04d91b9282d553c98ee1735863ce6
-
SHA256
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab
-
SHA512
c662c0ef129d7ce7b2dfb7ef62529a494ef6a7205fb346477076a4447e38c7b15cf2769a15bccf0602912f0030c656352c5b3a7aa1715b603be89d9ce6d5114c
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:DdseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1732 omsecor.exe 892 omsecor.exe 2012 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3040 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 3040 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 1732 omsecor.exe 1732 omsecor.exe 892 omsecor.exe 892 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1732 3040 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 30 PID 3040 wrote to memory of 1732 3040 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 30 PID 3040 wrote to memory of 1732 3040 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 30 PID 3040 wrote to memory of 1732 3040 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 30 PID 1732 wrote to memory of 892 1732 omsecor.exe 33 PID 1732 wrote to memory of 892 1732 omsecor.exe 33 PID 1732 wrote to memory of 892 1732 omsecor.exe 33 PID 1732 wrote to memory of 892 1732 omsecor.exe 33 PID 892 wrote to memory of 2012 892 omsecor.exe 34 PID 892 wrote to memory of 2012 892 omsecor.exe 34 PID 892 wrote to memory of 2012 892 omsecor.exe 34 PID 892 wrote to memory of 2012 892 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe"C:\Users\Admin\AppData\Local\Temp\d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ffb185e8f37f93d3c1711dc2b5c70d20
SHA17e611d60e24f26db99a43bbe1d7be6905bb0c243
SHA25652194a535bb7866c71aa16a7f392eecc41a29907859acaeb58cc11136f3bc42a
SHA512b865b5d05fd2bea01ea47dd750aecc2dc7e1167ae3cac241efbe59d3cdf9fd96ae4ba3ae238903bb612bacf69b0c2b52bc9daaccf33f67de2ce64e958b18b4b3
-
Filesize
80KB
MD5215a6cc9c83ba04223a4fb20a167c66a
SHA1c8e109924185af582aea0971a3947354348dfc33
SHA2563138e7846286f1bfaa5e1d2b4e5c4fd1133a9a74a86414f99c14639208c42cbe
SHA512b6dfbaeabaf2a1af37013986a1b4d69d27446ceb5f98b9a4768d8d22098c86adfbb0936d5d9ded274f5b88a81ea07fd55bb7336b549f02efb0128dcdf78f348d
-
Filesize
80KB
MD533da99745961a2f343f52b5c72d03bad
SHA1f547c7eda272f1430a51580721cfa923d86133f3
SHA256d77503362b33feedd8c9a26aeac23db7d8aef225a60a9c07556d57366a24531a
SHA51291af835562cfe3070f9518dd74742bc21de27c6602013483f8e07ed9457b0e24ce43985651bfded92245dfa3fc439fe1d30429b03e3cc39018eab9b4ff93ffe7