Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2024, 03:30
Behavioral task
behavioral1
Sample
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe
Resource
win7-20240903-en
General
-
Target
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe
-
Size
80KB
-
MD5
1a3aad5ce62edaf7923bab44dd9d8727
-
SHA1
03a9efa9b7f04d91b9282d553c98ee1735863ce6
-
SHA256
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab
-
SHA512
c662c0ef129d7ce7b2dfb7ef62529a494ef6a7205fb346477076a4447e38c7b15cf2769a15bccf0602912f0030c656352c5b3a7aa1715b603be89d9ce6d5114c
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:DdseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2460 omsecor.exe 960 omsecor.exe 1288 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3456 wrote to memory of 2460 3456 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 83 PID 3456 wrote to memory of 2460 3456 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 83 PID 3456 wrote to memory of 2460 3456 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 83 PID 2460 wrote to memory of 960 2460 omsecor.exe 99 PID 2460 wrote to memory of 960 2460 omsecor.exe 99 PID 2460 wrote to memory of 960 2460 omsecor.exe 99 PID 960 wrote to memory of 1288 960 omsecor.exe 100 PID 960 wrote to memory of 1288 960 omsecor.exe 100 PID 960 wrote to memory of 1288 960 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe"C:\Users\Admin\AppData\Local\Temp\d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1288
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD522cdb575f251f44861ff8f52dc4642ba
SHA14e19f19e368407ed296c785466a22431f2107246
SHA256f4f82e6c8317f80cdbfde9c7fd0a3195db6fecdeaaa1e06a68186df14dba1787
SHA512c28214592dfb591d06822cf3606e044a2b1bd1471bb385845590828d0fe1355a2ae446db0c51aa951da735f324a8bbbe3380cb6cab3c97b478f0fa201c2a8739
-
Filesize
80KB
MD5ffb185e8f37f93d3c1711dc2b5c70d20
SHA17e611d60e24f26db99a43bbe1d7be6905bb0c243
SHA25652194a535bb7866c71aa16a7f392eecc41a29907859acaeb58cc11136f3bc42a
SHA512b865b5d05fd2bea01ea47dd750aecc2dc7e1167ae3cac241efbe59d3cdf9fd96ae4ba3ae238903bb612bacf69b0c2b52bc9daaccf33f67de2ce64e958b18b4b3
-
Filesize
80KB
MD5815267f8f9f6f94a7d56149b31664db5
SHA1b738def1ec5508b08f1c9ab90f8089d3b5b35853
SHA2569b82b0bed70a424a2a04651b852e67285b1ae4528501dcfc1de957336188e2e4
SHA512adbd993b05a7e90d47b3144bdce839ba74e3769f7bf6cce4807349aba2297aa747af78a54b2915207c323506011c9a1ae763490d71f2c0f676cab1aaccbb0fbb