Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/01/2025, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe
Resource
win7-20240903-en
General
-
Target
fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe
-
Size
96KB
-
MD5
0a68231149af2d2de2fc3a35fb3bbc40
-
SHA1
5ffd534ec88af748dc1f5175113b0f211d40f3af
-
SHA256
fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5
-
SHA512
86a5cfe53a1735e109c5fac98727be340fa5e89f070e25ebf54ff9fd2fd5fc568f3e9a831c986e26c5b435cc5319e3c1de28d3cfa29e239a29c76ad9f48e4942
-
SSDEEP
1536:5nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxu:5Gs8cd8eXlYairZYqMddH13u
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3068 omsecor.exe 2800 omsecor.exe 860 omsecor.exe 1304 omsecor.exe 2756 omsecor.exe 1920 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2900 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 2900 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 3068 omsecor.exe 2800 omsecor.exe 2800 omsecor.exe 1304 omsecor.exe 1304 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2216 set thread context of 2900 2216 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 28 PID 3068 set thread context of 2800 3068 omsecor.exe 30 PID 860 set thread context of 1304 860 omsecor.exe 35 PID 2756 set thread context of 1920 2756 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2900 2216 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 28 PID 2216 wrote to memory of 2900 2216 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 28 PID 2216 wrote to memory of 2900 2216 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 28 PID 2216 wrote to memory of 2900 2216 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 28 PID 2216 wrote to memory of 2900 2216 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 28 PID 2216 wrote to memory of 2900 2216 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 28 PID 2900 wrote to memory of 3068 2900 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 29 PID 2900 wrote to memory of 3068 2900 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 29 PID 2900 wrote to memory of 3068 2900 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 29 PID 2900 wrote to memory of 3068 2900 fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe 29 PID 3068 wrote to memory of 2800 3068 omsecor.exe 30 PID 3068 wrote to memory of 2800 3068 omsecor.exe 30 PID 3068 wrote to memory of 2800 3068 omsecor.exe 30 PID 3068 wrote to memory of 2800 3068 omsecor.exe 30 PID 3068 wrote to memory of 2800 3068 omsecor.exe 30 PID 3068 wrote to memory of 2800 3068 omsecor.exe 30 PID 2800 wrote to memory of 860 2800 omsecor.exe 34 PID 2800 wrote to memory of 860 2800 omsecor.exe 34 PID 2800 wrote to memory of 860 2800 omsecor.exe 34 PID 2800 wrote to memory of 860 2800 omsecor.exe 34 PID 860 wrote to memory of 1304 860 omsecor.exe 35 PID 860 wrote to memory of 1304 860 omsecor.exe 35 PID 860 wrote to memory of 1304 860 omsecor.exe 35 PID 860 wrote to memory of 1304 860 omsecor.exe 35 PID 860 wrote to memory of 1304 860 omsecor.exe 35 PID 860 wrote to memory of 1304 860 omsecor.exe 35 PID 1304 wrote to memory of 2756 1304 omsecor.exe 36 PID 1304 wrote to memory of 2756 1304 omsecor.exe 36 PID 1304 wrote to memory of 2756 1304 omsecor.exe 36 PID 1304 wrote to memory of 2756 1304 omsecor.exe 36 PID 2756 wrote to memory of 1920 2756 omsecor.exe 37 PID 2756 wrote to memory of 1920 2756 omsecor.exe 37 PID 2756 wrote to memory of 1920 2756 omsecor.exe 37 PID 2756 wrote to memory of 1920 2756 omsecor.exe 37 PID 2756 wrote to memory of 1920 2756 omsecor.exe 37 PID 2756 wrote to memory of 1920 2756 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe"C:\Users\Admin\AppData\Local\Temp\fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exeC:\Users\Admin\AppData\Local\Temp\fc313d9c708893d2ecf6940916a9da2a63745ca43a4a52be92b353f4084f69f5N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD535afb09fb08b8c414c83808134204785
SHA1196effd894da34734b0980cfae0a132c556238ab
SHA256ade37df719267c53f9573a4fb1325e35cfae7c859560254f5020b64f33343525
SHA51203201954f03bf2f464e320acb77cb14bd2e73a31d5724493d621e6b989102d0d0aa0d7022bf5b156b3cd1e20cc807439259b1242de3ad1feb311ab86cac03d3a
-
Filesize
96KB
MD55e242a07698b73b4aae1ac100add6ea5
SHA1920bc72f3bc09e78c2ebcd2c797a8839b176d6d0
SHA256594c6e93e6b007b90373df8df990fd3d873b8c08384187c5377607ae2e2b4cd6
SHA512646435900136d028078ae53bd52892c254809d7b9ad4863188b9facb11ede9d06975fec3c6b719a70af35424120089d523bafe3400afd96eac30c47b5447e4bf
-
Filesize
96KB
MD56a68b2cad4bb03812e79807d26487633
SHA197962a550159474546b32f906d994ed17169fd4f
SHA2569e5048cc11de3d6e53153f4b05abd09f4421b437eccfeedb46a073e2cfc23c2e
SHA512509d4564fec896ccf00b0c745e387ad1ef0fc30efee9ee38ce19424ca3c47ceb33f86e36c59351e1e87009ee2b579a784773f3a0de1ef72e40c75321bf005732