Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2025, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe
Resource
win7-20240903-en
General
-
Target
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe
-
Size
134KB
-
MD5
0d00526946b84d34a807a350500ce952
-
SHA1
6142c3bedab608c18b2b35572541a1047a63abe0
-
SHA256
c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e
-
SHA512
8aaa25fbe22a86b589495be5ffedb93640e326e587ebd0c1bd6f066d0ade720306ccde6373bd0ec813990c92cf5ef7f87c809bd749222198f0f1db3eef9cb3f1
-
SSDEEP
1536:bDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi9:XiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4008 omsecor.exe 4420 omsecor.exe 1080 omsecor.exe 5084 omsecor.exe 4200 omsecor.exe 1608 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3080 set thread context of 3252 3080 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 83 PID 4008 set thread context of 4420 4008 omsecor.exe 87 PID 1080 set thread context of 5084 1080 omsecor.exe 108 PID 4200 set thread context of 1608 4200 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 3300 4008 WerFault.exe 85 2128 3080 WerFault.exe 82 4348 1080 WerFault.exe 107 3140 4200 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3080 wrote to memory of 3252 3080 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 83 PID 3080 wrote to memory of 3252 3080 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 83 PID 3080 wrote to memory of 3252 3080 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 83 PID 3080 wrote to memory of 3252 3080 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 83 PID 3080 wrote to memory of 3252 3080 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 83 PID 3252 wrote to memory of 4008 3252 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 85 PID 3252 wrote to memory of 4008 3252 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 85 PID 3252 wrote to memory of 4008 3252 c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe 85 PID 4008 wrote to memory of 4420 4008 omsecor.exe 87 PID 4008 wrote to memory of 4420 4008 omsecor.exe 87 PID 4008 wrote to memory of 4420 4008 omsecor.exe 87 PID 4008 wrote to memory of 4420 4008 omsecor.exe 87 PID 4008 wrote to memory of 4420 4008 omsecor.exe 87 PID 4420 wrote to memory of 1080 4420 omsecor.exe 107 PID 4420 wrote to memory of 1080 4420 omsecor.exe 107 PID 4420 wrote to memory of 1080 4420 omsecor.exe 107 PID 1080 wrote to memory of 5084 1080 omsecor.exe 108 PID 1080 wrote to memory of 5084 1080 omsecor.exe 108 PID 1080 wrote to memory of 5084 1080 omsecor.exe 108 PID 1080 wrote to memory of 5084 1080 omsecor.exe 108 PID 1080 wrote to memory of 5084 1080 omsecor.exe 108 PID 5084 wrote to memory of 4200 5084 omsecor.exe 110 PID 5084 wrote to memory of 4200 5084 omsecor.exe 110 PID 5084 wrote to memory of 4200 5084 omsecor.exe 110 PID 4200 wrote to memory of 1608 4200 omsecor.exe 112 PID 4200 wrote to memory of 1608 4200 omsecor.exe 112 PID 4200 wrote to memory of 1608 4200 omsecor.exe 112 PID 4200 wrote to memory of 1608 4200 omsecor.exe 112 PID 4200 wrote to memory of 1608 4200 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe"C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exeC:\Users\Admin\AppData\Local\Temp\c01b7fba0c779535f8f189195715fbc8f559a81844c572f5c3f01d6062b79c0e.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 2568⤵
- Program crash
PID:3140
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 2926⤵
- Program crash
PID:4348
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 2884⤵
- Program crash
PID:3300
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 2882⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3080 -ip 30801⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4008 -ip 40081⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1080 -ip 10801⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4200 -ip 42001⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5ba8f13f73802a24b638ada86abdd8728
SHA150ee4db337315c267f4d0eee79e26fa7d4d47c4c
SHA256620c9f54101a0f34e0f6c71765da5e402ab7c49694bbe5255f856ff542c76866
SHA512461f781433bbd0ba38e864f309e00fed94cbe7a982fd3462cc39450ffb27c3a621e1eb37eb5259aa30cd28b5f2df6d0cfaf0d260164318405ac777bcd7d47068
-
Filesize
134KB
MD526b123b35375434cc474e9100c138a89
SHA1189a1aca36bba7fbc4e48bcf7d3e35b191c8a145
SHA256edea49cf3448b574be8d41bf09ef83568ff121705964ab3ed68e943b1b4d3c29
SHA512e6fef0ed5d39e11c26cd0f95300b2da6795bcaca32335b6ca2107096c741877b90fbd43aac652f67530bff1d78099600e6caf1695e2baedd4315ea7f4ebbac05
-
Filesize
134KB
MD509ec5e5985876234f5187f8c47ab5e6c
SHA1e058f7288248aafa1619cb4907a515874f71a923
SHA2565fc71ce8c21d100832c4a2bf53b8606dc583b1860f15f392093af8e31c139727
SHA512648836053a7f9360879b79e9597974172c8e91c9a1add3507e6cfd0292e9a1f4001bfe2c06a47693f9c83317a730e434efaa5139a088d0689537ddad52d3174e