Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2025, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe
Resource
win7-20241010-en
General
-
Target
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe
-
Size
96KB
-
MD5
935034ed710c7393ffc572c5f46674cd
-
SHA1
0d5e36171d8491af625a580969badcb4805c62fb
-
SHA256
2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842
-
SHA512
cbaba63a8b020aa64318c7c78b07d5d6c242b97a6c229c26676b64c6f8298208d7c61ea577b8a3fec5f1505b965b886d09cf149ec6c13ddeccab0a375cdf50f1
-
SSDEEP
1536:lnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:lGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4400 omsecor.exe 2828 omsecor.exe 1348 omsecor.exe 4760 omsecor.exe 744 omsecor.exe 3080 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1048 set thread context of 4040 1048 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 83 PID 4400 set thread context of 2828 4400 omsecor.exe 88 PID 1348 set thread context of 4760 1348 omsecor.exe 108 PID 744 set thread context of 3080 744 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 2180 1048 WerFault.exe 82 4676 4400 WerFault.exe 85 3944 1348 WerFault.exe 107 1328 744 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1048 wrote to memory of 4040 1048 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 83 PID 1048 wrote to memory of 4040 1048 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 83 PID 1048 wrote to memory of 4040 1048 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 83 PID 1048 wrote to memory of 4040 1048 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 83 PID 1048 wrote to memory of 4040 1048 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 83 PID 4040 wrote to memory of 4400 4040 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 85 PID 4040 wrote to memory of 4400 4040 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 85 PID 4040 wrote to memory of 4400 4040 2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe 85 PID 4400 wrote to memory of 2828 4400 omsecor.exe 88 PID 4400 wrote to memory of 2828 4400 omsecor.exe 88 PID 4400 wrote to memory of 2828 4400 omsecor.exe 88 PID 4400 wrote to memory of 2828 4400 omsecor.exe 88 PID 4400 wrote to memory of 2828 4400 omsecor.exe 88 PID 2828 wrote to memory of 1348 2828 omsecor.exe 107 PID 2828 wrote to memory of 1348 2828 omsecor.exe 107 PID 2828 wrote to memory of 1348 2828 omsecor.exe 107 PID 1348 wrote to memory of 4760 1348 omsecor.exe 108 PID 1348 wrote to memory of 4760 1348 omsecor.exe 108 PID 1348 wrote to memory of 4760 1348 omsecor.exe 108 PID 1348 wrote to memory of 4760 1348 omsecor.exe 108 PID 1348 wrote to memory of 4760 1348 omsecor.exe 108 PID 4760 wrote to memory of 744 4760 omsecor.exe 110 PID 4760 wrote to memory of 744 4760 omsecor.exe 110 PID 4760 wrote to memory of 744 4760 omsecor.exe 110 PID 744 wrote to memory of 3080 744 omsecor.exe 112 PID 744 wrote to memory of 3080 744 omsecor.exe 112 PID 744 wrote to memory of 3080 744 omsecor.exe 112 PID 744 wrote to memory of 3080 744 omsecor.exe 112 PID 744 wrote to memory of 3080 744 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe"C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exeC:\Users\Admin\AppData\Local\Temp\2a1a5c77cd97606c5accdd839862a6d53d5f8d080b61e0399f7085534e156842.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 744 -s 2568⤵
- Program crash
PID:1328
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 3046⤵
- Program crash
PID:3944
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 2884⤵
- Program crash
PID:4676
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 3002⤵
- Program crash
PID:2180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1048 -ip 10481⤵PID:4188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4400 -ip 44001⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1348 -ip 13481⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 744 -ip 7441⤵PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55f658f5355c4033a7f122251f5b91fed
SHA18500e50264f1135c0d2ffffb3397234a7feb94f1
SHA256f9a807d51abfcaf82caa327c10a6fd996221f7ceae4d63c66c8be5ec8fe5fe5e
SHA512954e2c4191ec6467adc9dd522aab369d2df26928e42abce8d3be9e24883cf93cf0f39a307db77f601fb2c7270572281a964e20d2ef8b57d1accb40537c29182b
-
Filesize
96KB
MD5e1f1ff1da39a6baaf4dbf3deaa1af0cd
SHA1486b5dcbb9d9693c649cd1f10a0a57cd475f9729
SHA25697337c0f5cfef23c7093870b4cf3ea51131fc82100798e7f8312d0c1fbb4ad89
SHA5128d29cd772da12d046e9bd5dc69623b1fe2e4533c0efd20617a69724ccd49947942c5a106b40d4a2355acdd1d6cd6cfad7dd18fac3ad3d763795e56c90c508069
-
Filesize
96KB
MD5ee9f31f1777c9dcfdf140c6105aa1f5d
SHA149784a8c603f8e34f428b0107ab627eafa011c47
SHA256a7594d589d4198ce1cbc741aa0b24727f2f00b1f5e22fdc2bb3a8d20925b325d
SHA512e039908828fabf90792a67b3de1ad7a42bab151cc2a75ce4912b36edc1b031982e53534581cb9bb7e42deb0c91d859286e522ea23a9ef709e5dad3ac96506990