Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/01/2025, 03:47
Behavioral task
behavioral1
Sample
JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe
-
Size
64KB
-
MD5
4bbea092210b652896836c7ed57301c2
-
SHA1
7fbff2ec2bba0a602550a60e591d9062b6e0dd06
-
SHA256
9466f8cabba1bc42a45f5eaf645e83c401e2f4d8b550fccb1dbf327faf31c9c8
-
SHA512
8c62d2b187fbd776b416e7dc7e3e9d8c9ce2d037b68314c641178f5fd57dc21c6d63644dbe5f9eb2859c134d73ccb8a02af7c9524410decc51aaf1438f9d3b70
-
SSDEEP
1536:od9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:YdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2704 omsecor.exe 2008 omsecor.exe 2804 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2156 JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe 2156 JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe 2704 omsecor.exe 2704 omsecor.exe 2008 omsecor.exe 2008 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2704 2156 JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe 30 PID 2156 wrote to memory of 2704 2156 JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe 30 PID 2156 wrote to memory of 2704 2156 JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe 30 PID 2156 wrote to memory of 2704 2156 JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe 30 PID 2704 wrote to memory of 2008 2704 omsecor.exe 33 PID 2704 wrote to memory of 2008 2704 omsecor.exe 33 PID 2704 wrote to memory of 2008 2704 omsecor.exe 33 PID 2704 wrote to memory of 2008 2704 omsecor.exe 33 PID 2008 wrote to memory of 2804 2008 omsecor.exe 34 PID 2008 wrote to memory of 2804 2008 omsecor.exe 34 PID 2008 wrote to memory of 2804 2008 omsecor.exe 34 PID 2008 wrote to memory of 2804 2008 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4bbea092210b652896836c7ed57301c2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD572aacbae74ceedbbe05250e50f2c25c4
SHA15cc836729b17e1aeea3492eceb2ad0ccdde1ef96
SHA2567e2660615778f8f9d976d5dd13eb762a52428fb7d6042f90d185927e07a9f7c5
SHA512ada3472839fa3d14fb9bf55a012cbf2e7625212bfe4bc5427832fce796977419c1c40885a2af1f47ca31d6e538dd48cd56c32076a908787629293f8f27da784d
-
Filesize
64KB
MD5740148476c0716696e4f39c705bd6152
SHA13e21138d8670ae6991b0ea63e4add4df61c27ec9
SHA256557cbad2ee3c8fad50b4d3e6d0980b58b0a7eed21baa2facf6015354637f1947
SHA51208f18eb1aa934e0da7a1fff55c81974f2d2b2de69a1a53512a6f87aed6802b388dae382b7edaaa53deec1548bf048b8349bb2c7fa4f3fe256979b54dca5010ac
-
Filesize
64KB
MD5ecaa416352aa1e1df140b59bd78f8835
SHA142e2febe49e85d2cb19377288637838016775f6f
SHA2566b3d88e4d1408d845483decfb15c131e9a9b41dfbc0e88a8c25652f3b3315e87
SHA512348196ddc6e43cd84dff7ec715466e9bd45da7e43808096ef26384b49617b96fb6c109df03f6b20492a5fad1b8c1c07c6527862a275b8a936158f856f3e36183