Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2025, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe
Resource
win7-20240903-en
General
-
Target
dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe
-
Size
128KB
-
MD5
73cab011babde57bf8e5e70ac85d2d3d
-
SHA1
40a2bb1bb24cbc90541cccd9274085e63cc723c7
-
SHA256
dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1
-
SHA512
1d218d1f7a7aa9c2ed37bb249cae28a1077d2a86ea58595213d2c9e53b5cee641c24ca3175a3b6ab987eb75ea6605c4633529eb0388e287febcbfc77e3bda298
-
SSDEEP
1536:8DfDbhERTatPLTLLbC+8BMNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabaa:iiRTe3n8BMAW6J6f1tqF6dngNmaZr3
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3508 omsecor.exe 5100 omsecor.exe 3908 omsecor.exe 4048 omsecor.exe 1924 omsecor.exe 4404 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1368 set thread context of 2608 1368 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 84 PID 3508 set thread context of 5100 3508 omsecor.exe 88 PID 3908 set thread context of 4048 3908 omsecor.exe 110 PID 1924 set thread context of 4404 1924 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 2668 3508 WerFault.exe 86 1652 1368 WerFault.exe 83 3036 3908 WerFault.exe 109 3512 1924 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2608 1368 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 84 PID 1368 wrote to memory of 2608 1368 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 84 PID 1368 wrote to memory of 2608 1368 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 84 PID 1368 wrote to memory of 2608 1368 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 84 PID 1368 wrote to memory of 2608 1368 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 84 PID 2608 wrote to memory of 3508 2608 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 86 PID 2608 wrote to memory of 3508 2608 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 86 PID 2608 wrote to memory of 3508 2608 dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe 86 PID 3508 wrote to memory of 5100 3508 omsecor.exe 88 PID 3508 wrote to memory of 5100 3508 omsecor.exe 88 PID 3508 wrote to memory of 5100 3508 omsecor.exe 88 PID 3508 wrote to memory of 5100 3508 omsecor.exe 88 PID 3508 wrote to memory of 5100 3508 omsecor.exe 88 PID 5100 wrote to memory of 3908 5100 omsecor.exe 109 PID 5100 wrote to memory of 3908 5100 omsecor.exe 109 PID 5100 wrote to memory of 3908 5100 omsecor.exe 109 PID 3908 wrote to memory of 4048 3908 omsecor.exe 110 PID 3908 wrote to memory of 4048 3908 omsecor.exe 110 PID 3908 wrote to memory of 4048 3908 omsecor.exe 110 PID 3908 wrote to memory of 4048 3908 omsecor.exe 110 PID 3908 wrote to memory of 4048 3908 omsecor.exe 110 PID 4048 wrote to memory of 1924 4048 omsecor.exe 112 PID 4048 wrote to memory of 1924 4048 omsecor.exe 112 PID 4048 wrote to memory of 1924 4048 omsecor.exe 112 PID 1924 wrote to memory of 4404 1924 omsecor.exe 114 PID 1924 wrote to memory of 4404 1924 omsecor.exe 114 PID 1924 wrote to memory of 4404 1924 omsecor.exe 114 PID 1924 wrote to memory of 4404 1924 omsecor.exe 114 PID 1924 wrote to memory of 4404 1924 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe"C:\Users\Admin\AppData\Local\Temp\dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exeC:\Users\Admin\AppData\Local\Temp\dc42a74163cf464f200edf88465381a04341c293548c3621c9c88c911ea90bb1.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 2528⤵
- Program crash
PID:3512
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 2926⤵
- Program crash
PID:3036
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 2884⤵
- Program crash
PID:2668
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 2962⤵
- Program crash
PID:1652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1368 -ip 13681⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3508 -ip 35081⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3908 -ip 39081⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1924 -ip 19241⤵PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD568d060309ea4480fcb23be147bc52b45
SHA128e260ccee801ec2d5813da934966da289ea3802
SHA256fb557898aa8a1394c3412f6d6ab66877285c4ee418b6a94f44444cb32097ce52
SHA51203257664bbfc8788a3ac1f5a06899a0a6a11ac5a86884d3e9e30b74a6d13cc906314620fd73106578206828498156fdf813c204584001f9dd9a23fb840c6489c
-
Filesize
128KB
MD54eb577f86e5104335dcaaa4b6c501787
SHA1097234f5e1cb350bec403286e395ed68a5f46e7a
SHA256ee2a2cb6ff9fbc37d29ea9b3dfcd595ac9b6f569a596e529c1a430a6357d86a1
SHA5124a3576f3354fc93cd6535ac33add4438e7de1ba2b82b990aa5ef43465ecd601022807707b8a05e05edf61117bd6d07ec7ab7a64c8abf23706ef440c6d3db4573
-
Filesize
128KB
MD5ebd234bae3e35b1c6c2cbd19dad71ee9
SHA1132d260feb6857244e48b5317c0f90325a4f114c
SHA25626c360bd6df5f2ff31905af3d2079733af8826ef012d4d3f1ff3fbd003b459dc
SHA512995b48d5b179242eac22a6c92b9fccb133a517b91009d25055f0b72740f8b41018dfe8b775221260fb0ac90a69595d0a92cd9c97cf68d64a0c76cb78cd6be92b