Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2025, 18:10
Behavioral task
behavioral1
Sample
JaffaCakes118_32c86669e13130f626559270d700b220.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_32c86669e13130f626559270d700b220.exe
-
Size
64KB
-
MD5
32c86669e13130f626559270d700b220
-
SHA1
e34bb4ee888e90fc93ccf17de7a94b3e2e0a5c10
-
SHA256
516ee6f6a9ca8ea6b3107077c120a92713ce464971d821df7d30f202c7ad5790
-
SHA512
e8be616e4c26fe1c2b57d659b744dec71e49ef15ec4dc9952c0b4b2de0afaadd4d2f17ebfb7e5068a60e5c508ef373bfcca9e7ebd8aedbebe0741b8d90a8b0fc
-
SSDEEP
1536:Ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:8dseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2180 omsecor.exe 4084 omsecor.exe 1876 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_32c86669e13130f626559270d700b220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 872 wrote to memory of 2180 872 JaffaCakes118_32c86669e13130f626559270d700b220.exe 82 PID 872 wrote to memory of 2180 872 JaffaCakes118_32c86669e13130f626559270d700b220.exe 82 PID 872 wrote to memory of 2180 872 JaffaCakes118_32c86669e13130f626559270d700b220.exe 82 PID 2180 wrote to memory of 4084 2180 omsecor.exe 100 PID 2180 wrote to memory of 4084 2180 omsecor.exe 100 PID 2180 wrote to memory of 4084 2180 omsecor.exe 100 PID 4084 wrote to memory of 1876 4084 omsecor.exe 101 PID 4084 wrote to memory of 1876 4084 omsecor.exe 101 PID 4084 wrote to memory of 1876 4084 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_32c86669e13130f626559270d700b220.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_32c86669e13130f626559270d700b220.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1876
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55182ef72cf45e66671cb2aa51b93435d
SHA1627a354a2178bf550489a379f7ea766885c1df87
SHA256eac776748d0fbc81e2b7de064500e2f71bb71bfe36ea4effb7fb3450c9ee8a27
SHA5122d12a14d063760349e4de1bd14d62ac0795c9ed81383d753e3d4f4ca16a535543c613f9d343e864ba7d9f78900f065a550aea9427f90bb1ef10026cbebbe9163
-
Filesize
64KB
MD5fdb45b9d3667b7c84b82171a120ba653
SHA16c12d2ff59f3217e7dea2db31b92f743eb89c83f
SHA256886b946f4b66246c11b0b674be79853283ebcdc9cf6fdb31887c86c335ebc822
SHA512d628118acc36154d3c914f0ddd4a2b745a640785fdeb21a417e4c2e390d0a402a2d29f932a674b9347e7ab84b0ab9fd596d018c8a635a3c236c0d125570e2d29
-
Filesize
64KB
MD5a64733688758f01ef40582c677e7b938
SHA16dee0e37b4c9fada783fd89144ff8f1cde8c183c
SHA25649ffa1e8fb7c0bbe34fc8d2306e97c23b63d451134dd525bf244c2ebf0b81422
SHA512b650ab4bc44a770f297dd7d029cc6ca1b29daf09573162bb974684c3ea4cbc71d3a0e0160a1dab5b5c02f2234131b34d2d3d42665de63bf53c6619dda42ac6fe