Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09/01/2025, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe
Resource
win7-20241010-en
General
-
Target
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe
-
Size
96KB
-
MD5
935034ed710c7393ffc572c5f46674cd
-
SHA1
0d5e36171d8491af625a580969badcb4805c62fb
-
SHA256
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842
-
SHA512
cbaba63a8b020aa64318c7c78b07d5d6c242b97a6c229c26676b64c6f8298208d7c61ea577b8a3fec5f1505b965b886d09cf149ec6c13ddeccab0a375cdf50f1
-
SSDEEP
1536:lnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:lGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2564 omsecor.exe 2704 omsecor.exe 2712 omsecor.exe 1080 omsecor.exe 2144 omsecor.exe 2204 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2524 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 2524 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 2564 omsecor.exe 2704 omsecor.exe 2704 omsecor.exe 1080 omsecor.exe 1080 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2520 set thread context of 2524 2520 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2564 set thread context of 2704 2564 omsecor.exe 33 PID 2712 set thread context of 1080 2712 omsecor.exe 37 PID 2144 set thread context of 2204 2144 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2524 2520 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2520 wrote to memory of 2524 2520 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2520 wrote to memory of 2524 2520 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2520 wrote to memory of 2524 2520 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2520 wrote to memory of 2524 2520 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2520 wrote to memory of 2524 2520 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 31 PID 2524 wrote to memory of 2564 2524 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 32 PID 2524 wrote to memory of 2564 2524 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 32 PID 2524 wrote to memory of 2564 2524 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 32 PID 2524 wrote to memory of 2564 2524 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 32 PID 2564 wrote to memory of 2704 2564 omsecor.exe 33 PID 2564 wrote to memory of 2704 2564 omsecor.exe 33 PID 2564 wrote to memory of 2704 2564 omsecor.exe 33 PID 2564 wrote to memory of 2704 2564 omsecor.exe 33 PID 2564 wrote to memory of 2704 2564 omsecor.exe 33 PID 2564 wrote to memory of 2704 2564 omsecor.exe 33 PID 2704 wrote to memory of 2712 2704 omsecor.exe 36 PID 2704 wrote to memory of 2712 2704 omsecor.exe 36 PID 2704 wrote to memory of 2712 2704 omsecor.exe 36 PID 2704 wrote to memory of 2712 2704 omsecor.exe 36 PID 2712 wrote to memory of 1080 2712 omsecor.exe 37 PID 2712 wrote to memory of 1080 2712 omsecor.exe 37 PID 2712 wrote to memory of 1080 2712 omsecor.exe 37 PID 2712 wrote to memory of 1080 2712 omsecor.exe 37 PID 2712 wrote to memory of 1080 2712 omsecor.exe 37 PID 2712 wrote to memory of 1080 2712 omsecor.exe 37 PID 1080 wrote to memory of 2144 1080 omsecor.exe 38 PID 1080 wrote to memory of 2144 1080 omsecor.exe 38 PID 1080 wrote to memory of 2144 1080 omsecor.exe 38 PID 1080 wrote to memory of 2144 1080 omsecor.exe 38 PID 2144 wrote to memory of 2204 2144 omsecor.exe 39 PID 2144 wrote to memory of 2204 2144 omsecor.exe 39 PID 2144 wrote to memory of 2204 2144 omsecor.exe 39 PID 2144 wrote to memory of 2204 2144 omsecor.exe 39 PID 2144 wrote to memory of 2204 2144 omsecor.exe 39 PID 2144 wrote to memory of 2204 2144 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe"C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exeC:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e1f1ff1da39a6baaf4dbf3deaa1af0cd
SHA1486b5dcbb9d9693c649cd1f10a0a57cd475f9729
SHA25697337c0f5cfef23c7093870b4cf3ea51131fc82100798e7f8312d0c1fbb4ad89
SHA5128d29cd772da12d046e9bd5dc69623b1fe2e4533c0efd20617a69724ccd49947942c5a106b40d4a2355acdd1d6cd6cfad7dd18fac3ad3d763795e56c90c508069
-
Filesize
96KB
MD54d495ba6068fc018d01fc6051ee22499
SHA14feb0b17f60a67e30c18af7dc426b2f62928bbe5
SHA256cb78ff7cbb3ace34f09aecad582015b686397883be73f7440135c01e376f9359
SHA512ebb994f702158e3639c2d933af0e591ce939333bbdcaa9706072f08e0053bde7cad312fa56473772325f10dfdc8f9af2d548e13252db8e1e6cfffedef63ccfca
-
Filesize
96KB
MD5bf975682542872015c23a72688e657a9
SHA1696b55a381fc8007a2cdfb22bb1d4bf79d523302
SHA256c05452bfbdfb4bfc9399367e4d84c3df48781452b54bc28eaecc318e379d7909
SHA512c461bb9fda56f74214676e29fd33604795e2d58d948edad633294c630596097c6f727ad0ef30088ac41957920b50082ff46b31f0e5879743312099e6540c5a38