Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2025, 13:29

General

  • Target

    0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe

  • Size

    80KB

  • MD5

    be9b73a0ecea7c7c16e179b5f7abba60

  • SHA1

    3e76d0ec8ff03bfcba85733b1a8c32834bf5a7c0

  • SHA256

    0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639

  • SHA512

    938d9f6542d590e391972a4488589c05e0b5f8916225015d2f857610fdfc94854960b4e5dcd19208781226190d83ae19e7dded4ad5055c47b1c1ec5b22457dde

  • SSDEEP

    768:sfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAK:sfbIvYvZEyFKF6N4yS+AQmZTl/5S

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe
    "C:\Users\Admin\AppData\Local\Temp\0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4592
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4068
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    727d44570b0d20cfa1249955dfef9811

    SHA1

    9afb64fc5bf9155d5e8e3c816e855836ea74ec0d

    SHA256

    18fc02d510b75fad6a299965c81a8f2ab56bcb752d3e0d71b6a1d2477ecd14cd

    SHA512

    b2c76e20989ee9b12c77c51b8924be2846ae6fc9d5574ee94f286c0e2c5ff8c328f737a8c72b4ed9990dd59e83d2941b26f5d64a130576c381367264d897e2cb

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    a58284942121fb4fd3e535c4d24af7e9

    SHA1

    1eecaf4e76133ad3ee3917343dc89d07adcc9df6

    SHA256

    425e9f2e72d1b2aee6cd77fdcc35cada58b9e75e584fbd2ce416af2ad0f9e6d2

    SHA512

    3a49111c0373e4091601530f5af78e0a30d9f72d3075e497818a89a5d40a84089ca552fd6592bb1143d847fa2c049f3e6fd4d5ff4cbf368e89fedcb604242a8a

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    50d01f3265d3400884853fe169731681

    SHA1

    ebbc3e4b74b1efb101ef502fb29f198749bafbd0

    SHA256

    d01ad75b46fab8d67aa7858da6f74fa443ee357d94c39addd1bcf7676ea96e94

    SHA512

    f1824f589293a14f026731245c86929e15d6c9a2181ba3ce37ca9c31ca50409bf37db640853475225f70d2d6662f6c38d660754548d93d6f50a483a4f5183869