Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 05:32
Behavioral task
behavioral1
Sample
eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2.exe
Resource
win7-20241023-en
General
-
Target
eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2.exe
-
Size
71KB
-
MD5
fed1744cabdbcd081f505619aba7ccee
-
SHA1
116890bc81f04855c587f98c4896397765e7df65
-
SHA256
eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2
-
SHA512
8ee8d58b710df5749867ed0dd30a65fe0ed2c4a739de377e5d827f0e29f462ee4fe1ea38918b2fd80f5a16cd7ab2f083fad3eca75f18f96ee9b14736bb233d9d
-
SSDEEP
1536:Rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHv:hdseIOMEZEyFjEOFqTiQmQDHIbHv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1664 omsecor.exe 4864 omsecor.exe 1752 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4216 wrote to memory of 1664 4216 eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2.exe 82 PID 4216 wrote to memory of 1664 4216 eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2.exe 82 PID 4216 wrote to memory of 1664 4216 eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2.exe 82 PID 1664 wrote to memory of 4864 1664 omsecor.exe 92 PID 1664 wrote to memory of 4864 1664 omsecor.exe 92 PID 1664 wrote to memory of 4864 1664 omsecor.exe 92 PID 4864 wrote to memory of 1752 4864 omsecor.exe 93 PID 4864 wrote to memory of 1752 4864 omsecor.exe 93 PID 4864 wrote to memory of 1752 4864 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2.exe"C:\Users\Admin\AppData\Local\Temp\eb60f629bc961989e5bb2281d42e8d9cb23e1d5574adb2fc7873374b59a637f2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5b56f0976be07b28e819614890245780b
SHA15f244c556414185632c4d5f518d084ee525e7e42
SHA2566fe9c4cf5952f5796488152e21b8852eb87786598b66793f8c264fb922421657
SHA5129272db879b88cb00cdca7e576b45b71be2df378cb81b935baf0e9786b9c7dce7184aa7e5a198bce7b4b51754a920bd83f5ce3849fe6903786b85a682584f40d9
-
Filesize
71KB
MD53f04c8433451607a488a677ffb6f5381
SHA1bd947ccd91408b410f9865978a28742590a2e519
SHA25624f61a4a46a573fb54a948ca71e342d52ae49258426943effafc93feb35bb01a
SHA512d33ca5b46437d88a189f101121b94e75f020709aca0b84af5958bd05d1ff51c374ff831e8078773bd66297e32bfb7f6d5e23a3ec163357fa3cc31b49647c5581
-
Filesize
71KB
MD53ec0fd03e03b27c6f86a891951127fee
SHA10fb29c7b9d7bf3d55bae4189a790695a0dfc7d94
SHA2565c2a54a5f16c10753ca84a656f214c330560f27d678da4059c267265afb26371
SHA512118db722846003cabe5edf9f7afae115f988e7e005499f2b33828c1a3233f9b7f8b9a5f595e3d74bac5648f92e5d8e15da88a9e8e1e40e814366dd604c218e63