Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2025, 10:09
Static task
static1
Behavioral task
behavioral1
Sample
9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe
Resource
win7-20241010-en
General
-
Target
9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe
-
Size
134KB
-
MD5
7e24c5ea6b190011e71e9cac4f7595d0
-
SHA1
de15ef57cfe63e8632279ed147b4f74b8bbc9f4c
-
SHA256
9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2
-
SHA512
da2bececc40ae17401bda67c97b6ab3f2215940fb6d5e6052e7549c7f0b50a31eb8a1c1c977a1cbf7e58a4bfbf32f788851a74397b438faf6881b54a40a43006
-
SSDEEP
1536:7DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:3iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 896 omsecor.exe 4976 omsecor.exe 1764 omsecor.exe 1400 omsecor.exe 2720 omsecor.exe 2092 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5088 set thread context of 372 5088 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 82 PID 896 set thread context of 4976 896 omsecor.exe 87 PID 1764 set thread context of 1400 1764 omsecor.exe 100 PID 2720 set thread context of 2092 2720 omsecor.exe 104 -
Program crash 4 IoCs
pid pid_target Process procid_target 4764 5088 WerFault.exe 81 1792 896 WerFault.exe 85 3384 1764 WerFault.exe 99 3696 2720 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5088 wrote to memory of 372 5088 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 82 PID 5088 wrote to memory of 372 5088 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 82 PID 5088 wrote to memory of 372 5088 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 82 PID 5088 wrote to memory of 372 5088 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 82 PID 5088 wrote to memory of 372 5088 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 82 PID 372 wrote to memory of 896 372 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 85 PID 372 wrote to memory of 896 372 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 85 PID 372 wrote to memory of 896 372 9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe 85 PID 896 wrote to memory of 4976 896 omsecor.exe 87 PID 896 wrote to memory of 4976 896 omsecor.exe 87 PID 896 wrote to memory of 4976 896 omsecor.exe 87 PID 896 wrote to memory of 4976 896 omsecor.exe 87 PID 896 wrote to memory of 4976 896 omsecor.exe 87 PID 4976 wrote to memory of 1764 4976 omsecor.exe 99 PID 4976 wrote to memory of 1764 4976 omsecor.exe 99 PID 4976 wrote to memory of 1764 4976 omsecor.exe 99 PID 1764 wrote to memory of 1400 1764 omsecor.exe 100 PID 1764 wrote to memory of 1400 1764 omsecor.exe 100 PID 1764 wrote to memory of 1400 1764 omsecor.exe 100 PID 1764 wrote to memory of 1400 1764 omsecor.exe 100 PID 1764 wrote to memory of 1400 1764 omsecor.exe 100 PID 1400 wrote to memory of 2720 1400 omsecor.exe 102 PID 1400 wrote to memory of 2720 1400 omsecor.exe 102 PID 1400 wrote to memory of 2720 1400 omsecor.exe 102 PID 2720 wrote to memory of 2092 2720 omsecor.exe 104 PID 2720 wrote to memory of 2092 2720 omsecor.exe 104 PID 2720 wrote to memory of 2092 2720 omsecor.exe 104 PID 2720 wrote to memory of 2092 2720 omsecor.exe 104 PID 2720 wrote to memory of 2092 2720 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe"C:\Users\Admin\AppData\Local\Temp\9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exeC:\Users\Admin\AppData\Local\Temp\9bc42851c88a5c5b61088796b5a70a95d5022c615545f9dbb369d3cae99f1be2N.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 2568⤵
- Program crash
PID:3696
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 2926⤵
- Program crash
PID:3384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 2964⤵
- Program crash
PID:1792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 2722⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5088 -ip 50881⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 896 -ip 8961⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1764 -ip 17641⤵PID:3908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2720 -ip 27201⤵PID:336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD500da085700945004288dc7dc71274f16
SHA1661d184c57fc0ad65c69572d263c34fd740dc2f9
SHA2566f0c5b412b2212c809c6bbc93a4257e75e1f746fc8675f0eebcf51dd51ebab92
SHA512cd7eff6f9b89d17a955ffc2a09482b266270114a31578cfa5deb6fc21d6b24d879720fe596a661d9fa65503e7d2017c967ba30194ccbca1187eeb8f3b0391c68
-
Filesize
134KB
MD5ddb1ebf28d678b17251adfde4c4dce7c
SHA100e06e873f93dcbc219ae611e1736ad414976999
SHA2561c2cc2e3dab03fa8b2e17d99727fcdcdf2875ba98169dbbe86ca800caa1d8fed
SHA51201752ad6461e06e0d023f6a2dc1f02b6c02091ffc45e5b0f768de51d71ed6a6dc84a78ff40f8f6c810d294f4d7d3a214ef546e4136b8bdb15e70ea4b6506bb78
-
Filesize
134KB
MD538b98a0cf8bd6c3e328f8bb9777762e0
SHA1a8e690cb58655b17a023972efc33ec06a090e8db
SHA256002287ed5e642aa8b60a955f2383c26ad79b494e36fef3bad1c9f69c82ffd258
SHA5120517214abb6d5794c8ba9e8d2c08bea71b50695a921b81a78e2cdded681da3bcc6ec197aac6cf4c3439ff74e08136b37c9e84efdc57c3b3d44c89de415315bfd