Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/01/2025, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe
Resource
win7-20240903-en
General
-
Target
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe
-
Size
134KB
-
MD5
0d00526946b84d34a807a350500ce952
-
SHA1
6142c3bedab608c18b2b35572541a1047a63abe0
-
SHA256
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e
-
SHA512
8aaa25fbe22a86b589495be5ffedb93640e326e587ebd0c1bd6f066d0ade720306ccde6373bd0ec813990c92cf5ef7f87c809bd749222198f0f1db3eef9cb3f1
-
SSDEEP
1536:bDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi9:XiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2364 omsecor.exe 2144 omsecor.exe 1060 omsecor.exe 2600 omsecor.exe 1848 omsecor.exe 2216 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1868 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 1868 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 2364 omsecor.exe 2144 omsecor.exe 2144 omsecor.exe 2600 omsecor.exe 2600 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1224 set thread context of 1868 1224 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 31 PID 2364 set thread context of 2144 2364 omsecor.exe 33 PID 1060 set thread context of 2600 1060 omsecor.exe 37 PID 1848 set thread context of 2216 1848 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1868 1224 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 31 PID 1224 wrote to memory of 1868 1224 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 31 PID 1224 wrote to memory of 1868 1224 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 31 PID 1224 wrote to memory of 1868 1224 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 31 PID 1224 wrote to memory of 1868 1224 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 31 PID 1224 wrote to memory of 1868 1224 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 31 PID 1868 wrote to memory of 2364 1868 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 32 PID 1868 wrote to memory of 2364 1868 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 32 PID 1868 wrote to memory of 2364 1868 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 32 PID 1868 wrote to memory of 2364 1868 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 32 PID 2364 wrote to memory of 2144 2364 omsecor.exe 33 PID 2364 wrote to memory of 2144 2364 omsecor.exe 33 PID 2364 wrote to memory of 2144 2364 omsecor.exe 33 PID 2364 wrote to memory of 2144 2364 omsecor.exe 33 PID 2364 wrote to memory of 2144 2364 omsecor.exe 33 PID 2364 wrote to memory of 2144 2364 omsecor.exe 33 PID 2144 wrote to memory of 1060 2144 omsecor.exe 36 PID 2144 wrote to memory of 1060 2144 omsecor.exe 36 PID 2144 wrote to memory of 1060 2144 omsecor.exe 36 PID 2144 wrote to memory of 1060 2144 omsecor.exe 36 PID 1060 wrote to memory of 2600 1060 omsecor.exe 37 PID 1060 wrote to memory of 2600 1060 omsecor.exe 37 PID 1060 wrote to memory of 2600 1060 omsecor.exe 37 PID 1060 wrote to memory of 2600 1060 omsecor.exe 37 PID 1060 wrote to memory of 2600 1060 omsecor.exe 37 PID 1060 wrote to memory of 2600 1060 omsecor.exe 37 PID 2600 wrote to memory of 1848 2600 omsecor.exe 38 PID 2600 wrote to memory of 1848 2600 omsecor.exe 38 PID 2600 wrote to memory of 1848 2600 omsecor.exe 38 PID 2600 wrote to memory of 1848 2600 omsecor.exe 38 PID 1848 wrote to memory of 2216 1848 omsecor.exe 39 PID 1848 wrote to memory of 2216 1848 omsecor.exe 39 PID 1848 wrote to memory of 2216 1848 omsecor.exe 39 PID 1848 wrote to memory of 2216 1848 omsecor.exe 39 PID 1848 wrote to memory of 2216 1848 omsecor.exe 39 PID 1848 wrote to memory of 2216 1848 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe"C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exeC:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD526b123b35375434cc474e9100c138a89
SHA1189a1aca36bba7fbc4e48bcf7d3e35b191c8a145
SHA256edea49cf3448b574be8d41bf09ef83568ff121705964ab3ed68e943b1b4d3c29
SHA512e6fef0ed5d39e11c26cd0f95300b2da6795bcaca32335b6ca2107096c741877b90fbd43aac652f67530bff1d78099600e6caf1695e2baedd4315ea7f4ebbac05
-
Filesize
134KB
MD564ec34649b3e8d308dadbb3e50229d1d
SHA10512fe70dff8d27f2817ab29276cad4a41d10141
SHA2561f6d8724edf621fd325ceb99362ebb523035b79169c2db465a92cca9380aac59
SHA512a98770c8b59dbe84208ba52eed0f35a5508a65c4cd641a133fa07e9e5a29c09c01adccf08acf853984e26d0906db8e8074030b585c542b19349adb07199c4dfc
-
Filesize
134KB
MD52948cbca725aeeee27ad32f588dd8f47
SHA159875353f5da2e63078c8621b19137ce4c37a253
SHA2564f66f8866429202fd777ab7778e9934f927fde296fd9ed1626719ef63fdfc713
SHA51282b7b744db01bfdef635a8ec2aba0c3effdafdeaf2d877fd1c156b3e370b8c99fe1f118e04cd2373426edf616264a057d0f05acccc67ff5f84094143b842b4b8