Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2025, 01:22
Behavioral task
behavioral1
Sample
42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe
Resource
win7-20240903-en
General
-
Target
42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe
-
Size
72KB
-
MD5
462c26d322751a036b3fca6c67ec4100
-
SHA1
77406805b377828f901652d298c88824684320b0
-
SHA256
42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2f
-
SHA512
ef1e73d9808489dfc011a40d36e2de3b4642abe4000a60b552cc5cb9068982626ec2a81a720f1f4b166fa45c8c53eb2f4e4f967931340eaf93cd78e19d0b8cbd
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211H:RdseIOMEZEyFjEOFqTiQm5l/5211H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4880 omsecor.exe 888 omsecor.exe 4436 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5020 wrote to memory of 4880 5020 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 83 PID 5020 wrote to memory of 4880 5020 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 83 PID 5020 wrote to memory of 4880 5020 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 83 PID 4880 wrote to memory of 888 4880 omsecor.exe 99 PID 4880 wrote to memory of 888 4880 omsecor.exe 99 PID 4880 wrote to memory of 888 4880 omsecor.exe 99 PID 888 wrote to memory of 4436 888 omsecor.exe 100 PID 888 wrote to memory of 4436 888 omsecor.exe 100 PID 888 wrote to memory of 4436 888 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe"C:\Users\Admin\AppData\Local\Temp\42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD520574781fdbb6a59e1431a34f7f65a1d
SHA18fedf4b36d23ddfc4fac91fd754aca6e62358b36
SHA256935cdc1e13004ed1c5805066861fa9b5b5260db0721d70d904d15ed68ada78f1
SHA512b85ccb511a839c6a880b961567f5df46ab7a09715e9724ff7f3a6855de1d1b814d458fa55498760e56be6be096aeb5eeeae04fce9c09844609edb2b41c823dde
-
Filesize
72KB
MD58979b0cf57f3afb2a76dcee8eea1d2bf
SHA17dc55aeac9dfbfa65aaa41ca4e98de17064cbdbf
SHA2560a0fe481d8fb902ac6880fe1a559427bb85deefb56964edbb766e0427249ece5
SHA5126b2fb8b2337811263e58ae0a47d08694ae4a2a50999d030ba33b0dd580fcba6b56ec9fea56b70b63be7c53b201c27cc39c4df095f2fa90b7b231f20fb56b9506
-
Filesize
72KB
MD599806515236059f02269f103abdde048
SHA1b111b71fd520698aa651a09fef6ba155ed35c551
SHA25622131d29caaa573fe39a5189e5e7f809ee0dce232bcddd9dc1d15d412b391694
SHA512d598153c38d67487434ed9e3f51b564425168c3106773da88cf9b3d5ad261a6cba5bbcb2f2514405a58546d1c80406a50cc538409cf2b639ab94e51e88de97dc