Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    114s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/01/2025, 01:22

General

  • Target

    42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe

  • Size

    72KB

  • MD5

    462c26d322751a036b3fca6c67ec4100

  • SHA1

    77406805b377828f901652d298c88824684320b0

  • SHA256

    42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2f

  • SHA512

    ef1e73d9808489dfc011a40d36e2de3b4642abe4000a60b552cc5cb9068982626ec2a81a720f1f4b166fa45c8c53eb2f4e4f967931340eaf93cd78e19d0b8cbd

  • SSDEEP

    1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211H:RdseIOMEZEyFjEOFqTiQm5l/5211H

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe
    "C:\Users\Admin\AppData\Local\Temp\42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:888
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    72KB

    MD5

    20574781fdbb6a59e1431a34f7f65a1d

    SHA1

    8fedf4b36d23ddfc4fac91fd754aca6e62358b36

    SHA256

    935cdc1e13004ed1c5805066861fa9b5b5260db0721d70d904d15ed68ada78f1

    SHA512

    b85ccb511a839c6a880b961567f5df46ab7a09715e9724ff7f3a6855de1d1b814d458fa55498760e56be6be096aeb5eeeae04fce9c09844609edb2b41c823dde

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    72KB

    MD5

    8979b0cf57f3afb2a76dcee8eea1d2bf

    SHA1

    7dc55aeac9dfbfa65aaa41ca4e98de17064cbdbf

    SHA256

    0a0fe481d8fb902ac6880fe1a559427bb85deefb56964edbb766e0427249ece5

    SHA512

    6b2fb8b2337811263e58ae0a47d08694ae4a2a50999d030ba33b0dd580fcba6b56ec9fea56b70b63be7c53b201c27cc39c4df095f2fa90b7b231f20fb56b9506

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    72KB

    MD5

    99806515236059f02269f103abdde048

    SHA1

    b111b71fd520698aa651a09fef6ba155ed35c551

    SHA256

    22131d29caaa573fe39a5189e5e7f809ee0dce232bcddd9dc1d15d412b391694

    SHA512

    d598153c38d67487434ed9e3f51b564425168c3106773da88cf9b3d5ad261a6cba5bbcb2f2514405a58546d1c80406a50cc538409cf2b639ab94e51e88de97dc