Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/01/2025, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe
Resource
win7-20240903-en
General
-
Target
f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe
-
Size
96KB
-
MD5
2d17db80c746f102a1c36b1d22186bc1
-
SHA1
362c08b5441f1f9bdbe8871a272374304081a977
-
SHA256
f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1
-
SHA512
65fe3886cfe0de9ac02d01c7409d807d6255798f81c52771b504cfab1c695fbc800aa7c0cc11d8cc2e124a2eba194bd39b0e3a9289c7a86429c75727ac9b820b
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:xGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4140 omsecor.exe 1964 omsecor.exe 4652 omsecor.exe 4732 omsecor.exe 4716 omsecor.exe 2416 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2476 set thread context of 1664 2476 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 83 PID 4140 set thread context of 1964 4140 omsecor.exe 88 PID 4652 set thread context of 4732 4652 omsecor.exe 108 PID 4716 set thread context of 2416 4716 omsecor.exe 112 -
Program crash 4 IoCs
pid pid_target Process procid_target 4496 2476 WerFault.exe 82 620 4140 WerFault.exe 86 3344 4652 WerFault.exe 107 4444 4716 WerFault.exe 110 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1664 2476 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 83 PID 2476 wrote to memory of 1664 2476 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 83 PID 2476 wrote to memory of 1664 2476 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 83 PID 2476 wrote to memory of 1664 2476 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 83 PID 2476 wrote to memory of 1664 2476 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 83 PID 1664 wrote to memory of 4140 1664 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 86 PID 1664 wrote to memory of 4140 1664 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 86 PID 1664 wrote to memory of 4140 1664 f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe 86 PID 4140 wrote to memory of 1964 4140 omsecor.exe 88 PID 4140 wrote to memory of 1964 4140 omsecor.exe 88 PID 4140 wrote to memory of 1964 4140 omsecor.exe 88 PID 4140 wrote to memory of 1964 4140 omsecor.exe 88 PID 4140 wrote to memory of 1964 4140 omsecor.exe 88 PID 1964 wrote to memory of 4652 1964 omsecor.exe 107 PID 1964 wrote to memory of 4652 1964 omsecor.exe 107 PID 1964 wrote to memory of 4652 1964 omsecor.exe 107 PID 4652 wrote to memory of 4732 4652 omsecor.exe 108 PID 4652 wrote to memory of 4732 4652 omsecor.exe 108 PID 4652 wrote to memory of 4732 4652 omsecor.exe 108 PID 4652 wrote to memory of 4732 4652 omsecor.exe 108 PID 4652 wrote to memory of 4732 4652 omsecor.exe 108 PID 4732 wrote to memory of 4716 4732 omsecor.exe 110 PID 4732 wrote to memory of 4716 4732 omsecor.exe 110 PID 4732 wrote to memory of 4716 4732 omsecor.exe 110 PID 4716 wrote to memory of 2416 4716 omsecor.exe 112 PID 4716 wrote to memory of 2416 4716 omsecor.exe 112 PID 4716 wrote to memory of 2416 4716 omsecor.exe 112 PID 4716 wrote to memory of 2416 4716 omsecor.exe 112 PID 4716 wrote to memory of 2416 4716 omsecor.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe"C:\Users\Admin\AppData\Local\Temp\f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exeC:\Users\Admin\AppData\Local\Temp\f9f1fa1a40b158ac1e233b3d18a11ba71ce760e379e01fba2200598bdf00a5c1.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4716 -s 2688⤵
- Program crash
PID:4444
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 2926⤵
- Program crash
PID:3344
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 2884⤵
- Program crash
PID:620
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 3002⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2476 -ip 24761⤵PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4140 -ip 41401⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4652 -ip 46521⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4716 -ip 47161⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53ada111746a34f83ad8aa9871f6de920
SHA15984089e00b3d1e28f9e1a781ce5f36e2fa4c086
SHA256f4415a3951673e530d930e7eaf90325fb52ac05247fbb533b857ec7c278b02fa
SHA512821ed13ac5bea447ae03c82e9fb4a8ce3d56b24a10f338ad27c93c6ea1a9542375657a983eff8d9b9ec40eb737192bc4f395b0ae3b4d2bf59a7c78d3a1caeca0
-
Filesize
96KB
MD5989c1d57b84e3cc6fc7068e40cb1ef91
SHA1cf25f970e2bf352ab289b7d8525f7f0ba224d6cc
SHA256a3f48785185fad31ba527be11a95833c0374fae11288f87dabe93065b87a5f3a
SHA512576a492c9e919dad00d4ead3262c936fcb21769bc2b33b014502ce472f4e87dc96d95b0cddf3b7d43009469f9c46463513f0bf65e461a365ee9007d57724426e
-
Filesize
96KB
MD5299b431401f5ecad6e33d5f94672629d
SHA141ab74dc0e16204ab7b22c503dcbe245d9a6a15d
SHA25671c7d6c3decff9f26c0c92cb6fda5ff53fbf99204ba0d09e3784350949d6b393
SHA512a5f2e0733b6e9c99aa276161d63040d2112f1e198a1b4634c9b9ca1859829e6d2e83668ac4506caa9decf8c59776ea3fbd0311b42198eff93a098de4f11e4ba6