Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2025, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe
Resource
win7-20240708-en
General
-
Target
4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe
-
Size
128KB
-
MD5
76ad31e7dce644b164e65c0c7df81ca0
-
SHA1
c7b06b97713a22f6206cd3361f54559c6b0470a7
-
SHA256
4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8
-
SHA512
e8048b5b820ce897d8fbab00fdd86d51c661aa23e86928912ce69d730fb5a83b2476dd6a3c34e9f252ec3bab0d3a4b3471bc8409a5076e82694fcf26e5c82cc7
-
SSDEEP
1536:8DfDbhERTatPLTLLbC+8BMNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabau:iiRTe3n8BMAW6J6f1tqF6dngNmaZrN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1372 omsecor.exe 3140 omsecor.exe 4656 omsecor.exe 2256 omsecor.exe 2584 omsecor.exe 4400 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3556 set thread context of 2672 3556 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 83 PID 1372 set thread context of 3140 1372 omsecor.exe 88 PID 4656 set thread context of 2256 4656 omsecor.exe 109 PID 2584 set thread context of 4400 2584 omsecor.exe 113 -
Program crash 4 IoCs
pid pid_target Process procid_target 2728 3556 WerFault.exe 82 2784 1372 WerFault.exe 85 316 4656 WerFault.exe 108 2744 2584 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2672 3556 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 83 PID 3556 wrote to memory of 2672 3556 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 83 PID 3556 wrote to memory of 2672 3556 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 83 PID 3556 wrote to memory of 2672 3556 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 83 PID 3556 wrote to memory of 2672 3556 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 83 PID 2672 wrote to memory of 1372 2672 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 85 PID 2672 wrote to memory of 1372 2672 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 85 PID 2672 wrote to memory of 1372 2672 4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe 85 PID 1372 wrote to memory of 3140 1372 omsecor.exe 88 PID 1372 wrote to memory of 3140 1372 omsecor.exe 88 PID 1372 wrote to memory of 3140 1372 omsecor.exe 88 PID 1372 wrote to memory of 3140 1372 omsecor.exe 88 PID 1372 wrote to memory of 3140 1372 omsecor.exe 88 PID 3140 wrote to memory of 4656 3140 omsecor.exe 108 PID 3140 wrote to memory of 4656 3140 omsecor.exe 108 PID 3140 wrote to memory of 4656 3140 omsecor.exe 108 PID 4656 wrote to memory of 2256 4656 omsecor.exe 109 PID 4656 wrote to memory of 2256 4656 omsecor.exe 109 PID 4656 wrote to memory of 2256 4656 omsecor.exe 109 PID 4656 wrote to memory of 2256 4656 omsecor.exe 109 PID 4656 wrote to memory of 2256 4656 omsecor.exe 109 PID 2256 wrote to memory of 2584 2256 omsecor.exe 111 PID 2256 wrote to memory of 2584 2256 omsecor.exe 111 PID 2256 wrote to memory of 2584 2256 omsecor.exe 111 PID 2584 wrote to memory of 4400 2584 omsecor.exe 113 PID 2584 wrote to memory of 4400 2584 omsecor.exe 113 PID 2584 wrote to memory of 4400 2584 omsecor.exe 113 PID 2584 wrote to memory of 4400 2584 omsecor.exe 113 PID 2584 wrote to memory of 4400 2584 omsecor.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe"C:\Users\Admin\AppData\Local\Temp\4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exeC:\Users\Admin\AppData\Local\Temp\4ff84a7908469411f80cba8703cde97010761dba00a818a6b8add28115945cf8N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2568⤵
- Program crash
PID:2744
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 2926⤵
- Program crash
PID:316
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 2884⤵
- Program crash
PID:2784
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3556 -s 2922⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3556 -ip 35561⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1372 -ip 13721⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4656 -ip 46561⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2584 -ip 25841⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5e592901f58dbc0d723b02161c25de09b
SHA17a524df3873b0f85510f387509a401c7283e7b05
SHA256ce23fdfa5c11fe603401aded783a620a2776772f693ebec312f2eaf718b66085
SHA512e02944dc9298383b22abe608411172d25ba7d11da0330508412066e5127359f864262926336f808915fd799afb3c7a3c4ef4f56ce7e01890731d7c3d9db094bd
-
Filesize
128KB
MD58cef9564016438cda60c98cf30783d48
SHA1503fabbd1f6f8c57e9e19d1c02aa0c7e4f5c5b35
SHA2565dbcb3b179c611851e56499e462f01b44c33916c7e76c561ba430c47ea815b42
SHA5123b54f05228fd0fdcbd3afbf1ee0a8ccf13ca0393e6814eac75d4f3d37f72e4f3cfd91a90c777a82f7958cf9c64d26a8ddbdc5e2a4eef8aaa49a76dd2489a3425
-
Filesize
128KB
MD570ec87368a1d42387bfdd532c062b375
SHA1194f1b493007ffcfa214c379397a2756db946189
SHA2568be6637fbd4e7ee65ca8abf8a3e6eb8b16fe64dd1c3c3b6d7a8b0d1af2a79b83
SHA512583bd59d6fb31101bce1383ff23af378a6810272214f28a7d41ad760efa400c2d943ed9e0f28e5a8c99099bd66cc927b67366fa21fc776f8c98e4d999be09567