Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/01/2025, 20:18
Behavioral task
behavioral1
Sample
13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe
Resource
win7-20240903-en
General
-
Target
13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe
-
Size
80KB
-
MD5
4d0883b8168f0bf86222e8b6219c64db
-
SHA1
75bad7d8fcff49d6fb97133cfe806a6fd884f7e8
-
SHA256
13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099
-
SHA512
f9c77bd93b2bf9621ebc36d50ec1838b909159280902672952be4a8d5b45c995cf85e7a14cf11d7a71dffe504f3d3359aa3c2c0067705e35a7e2927c9f7036ea
-
SSDEEP
768:IfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAO:IfbIvYvZEyFKF6N4yS+AQmZTl/5m
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2784 omsecor.exe 2540 omsecor.exe 1164 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2708 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 2708 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 2784 omsecor.exe 2784 omsecor.exe 2540 omsecor.exe 2540 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2784 2708 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 30 PID 2708 wrote to memory of 2784 2708 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 30 PID 2708 wrote to memory of 2784 2708 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 30 PID 2708 wrote to memory of 2784 2708 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 30 PID 2784 wrote to memory of 2540 2784 omsecor.exe 32 PID 2784 wrote to memory of 2540 2784 omsecor.exe 32 PID 2784 wrote to memory of 2540 2784 omsecor.exe 32 PID 2784 wrote to memory of 2540 2784 omsecor.exe 32 PID 2540 wrote to memory of 1164 2540 omsecor.exe 33 PID 2540 wrote to memory of 1164 2540 omsecor.exe 33 PID 2540 wrote to memory of 1164 2540 omsecor.exe 33 PID 2540 wrote to memory of 1164 2540 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe"C:\Users\Admin\AppData\Local\Temp\13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5dae79ad3d22465f19430f68373825dd6
SHA198028ac811c18030ceac656c1ca6482cf42902db
SHA256cf953ac51842d3131218d7e5954cc3059fb77bb090ea7503220ae96984a6ed4e
SHA512d293c9162c80ddabe518d593bc2d58ec9a3eba05a6f30a8b7acd2e021fdd19248e03463c4fcd8b3c2cbec15459bc49ad982ebdd3986fb3d1bd42ba994a64131a
-
Filesize
80KB
MD5b453144c29adb523351410752c5d1e8b
SHA13ab389e0afdabc4d099d009d2240da4c00c272c3
SHA2562c8aedcde2b7c49678ae73e0694de85946fd4fee401148135f9ab2c24fbc8462
SHA512a28642a83214c17465f37054b06ac93c9780022bd069ae66542428c6a0d7fb281456483b73d586ca9fe433f625ef189132f0c90bf68fe06d9dca0d7f4739457b
-
Filesize
80KB
MD5ef6f9160bca5bf1c69c33810aa94f9db
SHA15e83d2ce3f144640bbcb687b15435392a0d9297c
SHA256d9963f19de3a0734d08218932d76f8c45613ecde5c68ae74569cddd057fb859d
SHA5123363d4d02a16ffeed320db035c27474781888d4d5f860ea8bf08c62cd2358e8eccac94fdde3799e0bb4c1d880820fe004726747ec5d2ebc82bbdd86a2dfb096f