Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/01/2025, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe
Resource
win7-20240903-en
General
-
Target
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe
-
Size
96KB
-
MD5
935034ed710c7393ffc572c5f46674cd
-
SHA1
0d5e36171d8491af625a580969badcb4805c62fb
-
SHA256
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842
-
SHA512
cbaba63a8b020aa64318c7c78b07d5d6c242b97a6c229c26676b64c6f8298208d7c61ea577b8a3fec5f1505b965b886d09cf149ec6c13ddeccab0a375cdf50f1
-
SSDEEP
1536:lnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:lGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2396 omsecor.exe 2340 omsecor.exe 2000 omsecor.exe 1044 omsecor.exe 1512 omsecor.exe 2448 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2932 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 2932 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 2396 omsecor.exe 2340 omsecor.exe 2340 omsecor.exe 1044 omsecor.exe 1044 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2532 set thread context of 2932 2532 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 30 PID 2396 set thread context of 2340 2396 omsecor.exe 32 PID 2000 set thread context of 1044 2000 omsecor.exe 36 PID 1512 set thread context of 2448 1512 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2932 2532 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 30 PID 2532 wrote to memory of 2932 2532 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 30 PID 2532 wrote to memory of 2932 2532 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 30 PID 2532 wrote to memory of 2932 2532 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 30 PID 2532 wrote to memory of 2932 2532 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 30 PID 2532 wrote to memory of 2932 2532 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 30 PID 2932 wrote to memory of 2396 2932 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2932 wrote to memory of 2396 2932 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2932 wrote to memory of 2396 2932 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2932 wrote to memory of 2396 2932 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2396 wrote to memory of 2340 2396 omsecor.exe 32 PID 2396 wrote to memory of 2340 2396 omsecor.exe 32 PID 2396 wrote to memory of 2340 2396 omsecor.exe 32 PID 2396 wrote to memory of 2340 2396 omsecor.exe 32 PID 2396 wrote to memory of 2340 2396 omsecor.exe 32 PID 2396 wrote to memory of 2340 2396 omsecor.exe 32 PID 2340 wrote to memory of 2000 2340 omsecor.exe 35 PID 2340 wrote to memory of 2000 2340 omsecor.exe 35 PID 2340 wrote to memory of 2000 2340 omsecor.exe 35 PID 2340 wrote to memory of 2000 2340 omsecor.exe 35 PID 2000 wrote to memory of 1044 2000 omsecor.exe 36 PID 2000 wrote to memory of 1044 2000 omsecor.exe 36 PID 2000 wrote to memory of 1044 2000 omsecor.exe 36 PID 2000 wrote to memory of 1044 2000 omsecor.exe 36 PID 2000 wrote to memory of 1044 2000 omsecor.exe 36 PID 2000 wrote to memory of 1044 2000 omsecor.exe 36 PID 1044 wrote to memory of 1512 1044 omsecor.exe 37 PID 1044 wrote to memory of 1512 1044 omsecor.exe 37 PID 1044 wrote to memory of 1512 1044 omsecor.exe 37 PID 1044 wrote to memory of 1512 1044 omsecor.exe 37 PID 1512 wrote to memory of 2448 1512 omsecor.exe 38 PID 1512 wrote to memory of 2448 1512 omsecor.exe 38 PID 1512 wrote to memory of 2448 1512 omsecor.exe 38 PID 1512 wrote to memory of 2448 1512 omsecor.exe 38 PID 1512 wrote to memory of 2448 1512 omsecor.exe 38 PID 1512 wrote to memory of 2448 1512 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe"C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exeC:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e1f1ff1da39a6baaf4dbf3deaa1af0cd
SHA1486b5dcbb9d9693c649cd1f10a0a57cd475f9729
SHA25697337c0f5cfef23c7093870b4cf3ea51131fc82100798e7f8312d0c1fbb4ad89
SHA5128d29cd772da12d046e9bd5dc69623b1fe2e4533c0efd20617a69724ccd49947942c5a106b40d4a2355acdd1d6cd6cfad7dd18fac3ad3d763795e56c90c508069
-
Filesize
96KB
MD5f7d7727a1210a9bddb081ca2ae0deec6
SHA130bafd006c126ef29ff8165a0fa20ae0c5e63c92
SHA2560cc3dc5d94ebab29a752725ae995429e013a6f233fbfea4e544c940803e1be75
SHA5120acd371d2c36e6e476ada48a6392181e8030165b8fa08f5d13b3d945b919d567141e2ef664c29cb9bf93eaa37c10c0d5ffa92b86ab34362fe115f473f7e66dba
-
Filesize
96KB
MD5d1b68d80bf8541eb61d2c515538fded5
SHA1d011a3ea1d2e581dd6f3deccec2fbe123ff8ca1e
SHA256954d7ab06a5455ad735fc8e085656be9559a1ce71a15e6302538161a1c7acfcb
SHA5122f75b9857158414cef9acf0a18d6c047ca926fbc533917a295c0416d3b7cb2a455e51c5117ffa318dc9d9e60dcffb1f552ed7cbf3e415a4e797e2b009892ee02