Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2025, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432eN.exe
Resource
win7-20241010-en
General
-
Target
eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432eN.exe
-
Size
33KB
-
MD5
2afbf5ef5dbe767a28fc8701c5de7180
-
SHA1
975711a9549ee7116a47938a5d114915ceeddd97
-
SHA256
eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432e
-
SHA512
f221de6a18771b8cc25d4109132a7426f1efa08e1b5d62b7dafcfd1ad50a3015d290dd4bac64d062c125f87273550d01ad4649d19cca850938800f77ea5fd674
-
SSDEEP
768:afVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:afVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4908 omsecor.exe 1528 omsecor.exe 3556 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4908 4656 eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432eN.exe 83 PID 4656 wrote to memory of 4908 4656 eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432eN.exe 83 PID 4656 wrote to memory of 4908 4656 eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432eN.exe 83 PID 4908 wrote to memory of 1528 4908 omsecor.exe 100 PID 4908 wrote to memory of 1528 4908 omsecor.exe 100 PID 4908 wrote to memory of 1528 4908 omsecor.exe 100 PID 1528 wrote to memory of 3556 1528 omsecor.exe 101 PID 1528 wrote to memory of 3556 1528 omsecor.exe 101 PID 1528 wrote to memory of 3556 1528 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432eN.exe"C:\Users\Admin\AppData\Local\Temp\eab27175133c089656aac5da13dca473893cb19d716ad9dd38fa418c006c432eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD57f88cacf76936b04c824426a93aec872
SHA19b0b2dc31fa0499b09de1ca9809079829649ad4a
SHA256a0c685e862bd40e326c28ffeeee46b2e47f86441528fe4b3c8403c8503aefe0b
SHA5127d3f17986477f4e75a20bcf15e22bddabc71a20b8e5a3d1e0404ac6f7be7399668462747c43bb88ecc95ce6400d75d36b81dc7816ef67fe63803d342c59b1de3
-
Filesize
33KB
MD5cb78ac53443e5cdc20e5ce1db02bfabe
SHA1e9e81d12822053cd40b9dda45ff3fc45006c9e31
SHA25650f4c862d08ebec6b278ff9fb6b9cd60863bc77a3615c00969941bbbfa6e77df
SHA512c2100e9c21efed31f3df618d6e56333ae0e1acb589c0f62e8ee25858b84d4c1013c6202327cb855b2117b05214ec52fe98aa3332897141843dfb5c76e73e6ceb
-
Filesize
33KB
MD5b3a6b16556a9d4cdede6f6cc34e871ed
SHA1b8b359c74edf42a9f95be9f407406eb4f4acf9d4
SHA25624b339183acd82c5e64bb8d88f57ab88e8285d7300ea803148805e94b5b7017d
SHA512079f844b3650d2b77c0c6447cceffd05dd5143c3db9af736d2bbd863b2532ae6b6e21e3bbaa9f529fc9f4e08635ea3faf8719a9310ca90e20459d8192faf9f7f