Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2025, 03:28

General

  • Target

    240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe

  • Size

    33KB

  • MD5

    6b4a87610d7192ec35123b4f22ffa960

  • SHA1

    2e82ed58a2647815bf7c347e428bfd39d75f3e82

  • SHA256

    240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70d

  • SHA512

    b7656415066d4bacfbc9c985330130ce7258b33dfb637f4e97c9d557d33ac3905e9bbaa180c92b03f23c00ef6b3a1155b5c2660aa7aee401ccf01db4c221467f

  • SSDEEP

    768:jfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DJ:jfVRztyHo8QNHTk0qE5fslvN/956qw

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe
    "C:\Users\Admin\AppData\Local\Temp\240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3508
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4032
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    33KB

    MD5

    90c7fd5f1e2ac396dfd57f1d98bf9bf6

    SHA1

    407bf80c51b5e03816cc085739d12dcc58ec1feb

    SHA256

    821ae93fb9c0dfa68fb59e7d28c1bfadf4da3650a14876ff61b8125b781bdda4

    SHA512

    da456fe1fe51ce7c19a429fa0b85de82a364741cf7ddab29f73d8e29c2a6366111254057e4d2e30d58b0e8ebc2e0a92b041e4f3354dd770c3eb87bbd328f6bcf

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    33KB

    MD5

    d4e55264a543af7701667c51d88c2f77

    SHA1

    dd48b65fb142888a17dce3f495383b4c61c89b00

    SHA256

    ca8215ec74ecd6a2f4cabc1fcdf55214b11aa49d68d9c901c52560a1efad048e

    SHA512

    220de13dadf495d7f8aa727b05ba565b895ddfea74a7e84aefff22583f9a0ac8f04d0152afe6f8f3e7db9e256b3177984734b51405f87a5d3d9255e46e9d5ff7

  • memory/624-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/624-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3508-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3508-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4032-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4032-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4032-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4032-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4032-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4032-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB