Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 01:09
Behavioral task
behavioral1
Sample
44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525.exe
Resource
win7-20240729-en
General
-
Target
44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525.exe
-
Size
76KB
-
MD5
adda95e62c0ccaf958a55be967a4464e
-
SHA1
bd9d2732e8f6ab7bd77b45a177f9c9bf35e10755
-
SHA256
44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525
-
SHA512
fe3adaf4c5bc70b57ebaf464c29d2674031c0e46e793904d0c857d1b27e55698de63434d9407c29f68559172f1a246bd8e54f4b40653afb5cc6cd50ffde84124
-
SSDEEP
1536:vd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11F:HdseIOMEZEyFjEOFqaiQm5l/5w11F
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3360 omsecor.exe 3512 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3360 4828 44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525.exe 83 PID 4828 wrote to memory of 3360 4828 44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525.exe 83 PID 4828 wrote to memory of 3360 4828 44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525.exe 83 PID 3360 wrote to memory of 3512 3360 omsecor.exe 100 PID 3360 wrote to memory of 3512 3360 omsecor.exe 100 PID 3360 wrote to memory of 3512 3360 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525.exe"C:\Users\Admin\AppData\Local\Temp\44b82d665af546887fb1dfb1854d3790fde12aeba5f15e7ed032a9c4bc551525.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5d81b119049436743ae7dc2cc89d0c3f9
SHA17d180d63ed5a6dc704635fa585de90a44c1947c6
SHA256191bd1504f7dd8bda6826c2d2dffb353ce1e86f27ca13ec5522f1a502241c467
SHA512729b06537763a1f3035cea2e1375ab62af2f9e75357b9b650731f27c1acdb121d5a05f781848938801e5103780b499ee9dff9c2cfc44a17b504cba67ba7ef9f3
-
Filesize
76KB
MD5f157fb743b12495f75e1679e29bbeac5
SHA19a1dedcb711dadab238d2154c797a2575135a68a
SHA2569c8cd649c4228ca712129faf39031b688e2dd968992f2cf36e13c0588d406bbd
SHA5129671b3cfa99669833dca2e412f1284d64255c3d041e87bf19b2298162b359df923edbedc752e459c9ce6ed7eeee9f20cbfede31dafe60914f15b6d4235907160