Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe
Resource
win7-20241010-en
General
-
Target
240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe
-
Size
33KB
-
MD5
6b4a87610d7192ec35123b4f22ffa960
-
SHA1
2e82ed58a2647815bf7c347e428bfd39d75f3e82
-
SHA256
240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70d
-
SHA512
b7656415066d4bacfbc9c985330130ce7258b33dfb637f4e97c9d557d33ac3905e9bbaa180c92b03f23c00ef6b3a1155b5c2660aa7aee401ccf01db4c221467f
-
SSDEEP
768:jfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DJ:jfVRztyHo8QNHTk0qE5fslvN/956qw
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4032 omsecor.exe 624 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3508 wrote to memory of 4032 3508 240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe 82 PID 3508 wrote to memory of 4032 3508 240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe 82 PID 3508 wrote to memory of 4032 3508 240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe 82 PID 4032 wrote to memory of 624 4032 omsecor.exe 92 PID 4032 wrote to memory of 624 4032 omsecor.exe 92 PID 4032 wrote to memory of 624 4032 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe"C:\Users\Admin\AppData\Local\Temp\240dee6da2e284d7cc1628babe7cc0907f4654168f0bc36f1f3b2268be4ee70dN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD590c7fd5f1e2ac396dfd57f1d98bf9bf6
SHA1407bf80c51b5e03816cc085739d12dcc58ec1feb
SHA256821ae93fb9c0dfa68fb59e7d28c1bfadf4da3650a14876ff61b8125b781bdda4
SHA512da456fe1fe51ce7c19a429fa0b85de82a364741cf7ddab29f73d8e29c2a6366111254057e4d2e30d58b0e8ebc2e0a92b041e4f3354dd770c3eb87bbd328f6bcf
-
Filesize
33KB
MD5d4e55264a543af7701667c51d88c2f77
SHA1dd48b65fb142888a17dce3f495383b4c61c89b00
SHA256ca8215ec74ecd6a2f4cabc1fcdf55214b11aa49d68d9c901c52560a1efad048e
SHA512220de13dadf495d7f8aa727b05ba565b895ddfea74a7e84aefff22583f9a0ac8f04d0152afe6f8f3e7db9e256b3177984734b51405f87a5d3d9255e46e9d5ff7