Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe
Resource
win7-20240903-en
General
-
Target
de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe
-
Size
96KB
-
MD5
45f4352a4d3d6ae1d060f857a561d31e
-
SHA1
3ad478217477fd01bd5f7506b23cddf7287bb513
-
SHA256
de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc
-
SHA512
338dba83885f49274a02bd9306a8c9c01e3593b31636bf5559070af79962d21b5ce2fb43d778ce2c471711fd1f72452225c314a0bcbc980c908a3f4235d74cb9
-
SSDEEP
1536:inAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxT:iGs8cd8eXlYairZYqMddH13T
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1420 omsecor.exe 3396 omsecor.exe 2968 omsecor.exe 4040 omsecor.exe 1448 omsecor.exe 3588 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1608 set thread context of 2248 1608 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 83 PID 1420 set thread context of 3396 1420 omsecor.exe 88 PID 2968 set thread context of 4040 2968 omsecor.exe 109 PID 1448 set thread context of 3588 1448 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 1772 1608 WerFault.exe 82 100 1420 WerFault.exe 85 2044 2968 WerFault.exe 108 2032 1448 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2248 1608 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 83 PID 1608 wrote to memory of 2248 1608 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 83 PID 1608 wrote to memory of 2248 1608 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 83 PID 1608 wrote to memory of 2248 1608 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 83 PID 1608 wrote to memory of 2248 1608 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 83 PID 2248 wrote to memory of 1420 2248 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 85 PID 2248 wrote to memory of 1420 2248 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 85 PID 2248 wrote to memory of 1420 2248 de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe 85 PID 1420 wrote to memory of 3396 1420 omsecor.exe 88 PID 1420 wrote to memory of 3396 1420 omsecor.exe 88 PID 1420 wrote to memory of 3396 1420 omsecor.exe 88 PID 1420 wrote to memory of 3396 1420 omsecor.exe 88 PID 1420 wrote to memory of 3396 1420 omsecor.exe 88 PID 3396 wrote to memory of 2968 3396 omsecor.exe 108 PID 3396 wrote to memory of 2968 3396 omsecor.exe 108 PID 3396 wrote to memory of 2968 3396 omsecor.exe 108 PID 2968 wrote to memory of 4040 2968 omsecor.exe 109 PID 2968 wrote to memory of 4040 2968 omsecor.exe 109 PID 2968 wrote to memory of 4040 2968 omsecor.exe 109 PID 2968 wrote to memory of 4040 2968 omsecor.exe 109 PID 2968 wrote to memory of 4040 2968 omsecor.exe 109 PID 4040 wrote to memory of 1448 4040 omsecor.exe 111 PID 4040 wrote to memory of 1448 4040 omsecor.exe 111 PID 4040 wrote to memory of 1448 4040 omsecor.exe 111 PID 1448 wrote to memory of 3588 1448 omsecor.exe 113 PID 1448 wrote to memory of 3588 1448 omsecor.exe 113 PID 1448 wrote to memory of 3588 1448 omsecor.exe 113 PID 1448 wrote to memory of 3588 1448 omsecor.exe 113 PID 1448 wrote to memory of 3588 1448 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe"C:\Users\Admin\AppData\Local\Temp\de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exeC:\Users\Admin\AppData\Local\Temp\de4fbc62602a5f3cb36828b626944110db06fd3421683124303dbcd8871328fc.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 2568⤵
- Program crash
PID:2032
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 2926⤵
- Program crash
PID:2044
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 2884⤵
- Program crash
PID:100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2882⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1608 -ip 16081⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1420 -ip 14201⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2968 -ip 29681⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1448 -ip 14481⤵PID:1420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD50a59faedbebf0a2bd2c749bfc6d945d6
SHA10ec6e06f629dd895d8ac392d83b1ab31d929c108
SHA256954a8dc535c93cff1bf286abdf1b1c2bad8386f1a9af608fbf321eb5eaf66213
SHA5127fc46845204c8e8c29a32037143f9c10df36570b0184f336e500fd92fff2507032041edf4584e931e8a233918f856f564f086bed42fd5257f5323610f85da706
-
Filesize
96KB
MD586b8a847d9948af88cc7e6264060a925
SHA133f312781035a839e9f6128a41d26963bf756d46
SHA256c195593c0086de00fa77fc971509a4a840e5789b10d3bf15bf52178b767fa072
SHA5120bdf016b953bea8b772b94363094eb0b6679410cccc52642438f0d1538c5571b44004cdb411f14d3563b1b0739eb96b7593376732cf1fe7c12e377df66cbed09
-
Filesize
96KB
MD5a58d631ee8934602151e7c888fb4da0e
SHA1708f2c6c4fc8c7a4a787c5a14523d238b9bf589b
SHA25649579970a46c3717354d5f72fa15897f2f4f68dec31dfc9c3a73799d8c0be60c
SHA512b78835e800615667f3dfcb4b0477527dbbfbf9d2d555ed31d1a9a82de8b29de0fa46f618b6fb08d37eadf3533da877d411cecd1ef07ab40c034af1b262b48df3