Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/01/2025, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe
Resource
win7-20240903-en
General
-
Target
dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe
-
Size
128KB
-
MD5
73cab011babde57bf8e5e70ac85d2d3d
-
SHA1
40a2bb1bb24cbc90541cccd9274085e63cc723c7
-
SHA256
dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1
-
SHA512
1d218d1f7a7aa9c2ed37bb249cae28a1077d2a86ea58595213d2c9e53b5cee641c24ca3175a3b6ab987eb75ea6605c4633529eb0388e287febcbfc77e3bda298
-
SSDEEP
1536:8DfDbhERTatPLTLLbC+8BMNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabaa:iiRTe3n8BMAW6J6f1tqF6dngNmaZr3
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2880 omsecor.exe 2332 omsecor.exe 2740 omsecor.exe 2380 omsecor.exe 1964 omsecor.exe 396 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2676 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 2676 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 2880 omsecor.exe 2332 omsecor.exe 2332 omsecor.exe 2380 omsecor.exe 2380 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1948 set thread context of 2676 1948 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 30 PID 2880 set thread context of 2332 2880 omsecor.exe 32 PID 2740 set thread context of 2380 2740 omsecor.exe 36 PID 1964 set thread context of 396 1964 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2676 1948 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 30 PID 1948 wrote to memory of 2676 1948 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 30 PID 1948 wrote to memory of 2676 1948 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 30 PID 1948 wrote to memory of 2676 1948 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 30 PID 1948 wrote to memory of 2676 1948 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 30 PID 1948 wrote to memory of 2676 1948 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 30 PID 2676 wrote to memory of 2880 2676 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 31 PID 2676 wrote to memory of 2880 2676 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 31 PID 2676 wrote to memory of 2880 2676 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 31 PID 2676 wrote to memory of 2880 2676 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 31 PID 2880 wrote to memory of 2332 2880 omsecor.exe 32 PID 2880 wrote to memory of 2332 2880 omsecor.exe 32 PID 2880 wrote to memory of 2332 2880 omsecor.exe 32 PID 2880 wrote to memory of 2332 2880 omsecor.exe 32 PID 2880 wrote to memory of 2332 2880 omsecor.exe 32 PID 2880 wrote to memory of 2332 2880 omsecor.exe 32 PID 2332 wrote to memory of 2740 2332 omsecor.exe 35 PID 2332 wrote to memory of 2740 2332 omsecor.exe 35 PID 2332 wrote to memory of 2740 2332 omsecor.exe 35 PID 2332 wrote to memory of 2740 2332 omsecor.exe 35 PID 2740 wrote to memory of 2380 2740 omsecor.exe 36 PID 2740 wrote to memory of 2380 2740 omsecor.exe 36 PID 2740 wrote to memory of 2380 2740 omsecor.exe 36 PID 2740 wrote to memory of 2380 2740 omsecor.exe 36 PID 2740 wrote to memory of 2380 2740 omsecor.exe 36 PID 2740 wrote to memory of 2380 2740 omsecor.exe 36 PID 2380 wrote to memory of 1964 2380 omsecor.exe 37 PID 2380 wrote to memory of 1964 2380 omsecor.exe 37 PID 2380 wrote to memory of 1964 2380 omsecor.exe 37 PID 2380 wrote to memory of 1964 2380 omsecor.exe 37 PID 1964 wrote to memory of 396 1964 omsecor.exe 38 PID 1964 wrote to memory of 396 1964 omsecor.exe 38 PID 1964 wrote to memory of 396 1964 omsecor.exe 38 PID 1964 wrote to memory of 396 1964 omsecor.exe 38 PID 1964 wrote to memory of 396 1964 omsecor.exe 38 PID 1964 wrote to memory of 396 1964 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe"C:\Users\Admin\AppData\Local\Temp\dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exeC:\Users\Admin\AppData\Local\Temp\dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:396
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD58bebe03baadea6680894f8ae923efab7
SHA1531b18466a24dd67c12b3b54b063f034737c1117
SHA25621454e1db2a9f1cbd77942d79602e2a2a779b36922dead1ed29e2021c8618ce0
SHA51249ebfdf2cc9cc2a0bb3ef2babf2360986abb69c089111cc2869cc3efafc494f1ef0f9c0373ee9c50d2d58edb720a54a41db622d4d1a652fbf549a02dc44b49a8
-
Filesize
128KB
MD54eb577f86e5104335dcaaa4b6c501787
SHA1097234f5e1cb350bec403286e395ed68a5f46e7a
SHA256ee2a2cb6ff9fbc37d29ea9b3dfcd595ac9b6f569a596e529c1a430a6357d86a1
SHA5124a3576f3354fc93cd6535ac33add4438e7de1ba2b82b990aa5ef43465ecd601022807707b8a05e05edf61117bd6d07ec7ab7a64c8abf23706ef440c6d3db4573
-
Filesize
128KB
MD567781e16436ffe6a518e45a2d53098df
SHA1a997a363672f073f43a098f7edb4a5a2f7e749b9
SHA25638ca434e476510dcb94877a5ae9a006fa6b6a03ef1aec901a2013e0c50d1a27f
SHA5128033121b328c0ece3ae96807d2204bffdafcf0e7c0ed8c389e4d5f6657b98e9cd03ef9a953f13c168ea49d41e4c69ecc16885849a1c7fda693ff54979b66d084