Malware Analysis Report

2024-11-16 13:01

Sample ID 240523-aryn7seh36
Target 922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b
SHA256 922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b
Tags
neconyd trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b

Threat Level: Known bad

The file 922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b was found to be: Known bad.

Malicious Activity Summary

neconyd trojan

Neconyd family

Neconyd

Executes dropped EXE

Loads dropped DLL

Drops file in System32 directory

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-23 00:27

Signatures

Neconyd family

neconyd

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-23 00:27

Reported

2024-05-23 00:29

Platform

win7-20240508-en

Max time kernel

145s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2116 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2116 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2116 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2116 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2228 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2228 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2228 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2228 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2892 wrote to memory of 1992 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2892 wrote to memory of 1992 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2892 wrote to memory of 1992 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2892 wrote to memory of 1992 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe

"C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 ow5dirasuek.com udp
US 35.91.124.102:80 ow5dirasuek.com tcp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp

Files

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 0be4f9ce60bd2c5f8871fb3dfc64131f
SHA1 ec093bb07d53b8efe5c6f5329c82aeec0600533d
SHA256 ede0341641abbbc6217190d86edb998d3491069493b21dfd267862d2ccfd3dda
SHA512 7ca146cac9789d13a1bbc6738e5433fece0d2d6ebd06313912d783b1f2c4befbd05941da1eadfa4634d990340d6a438c69d3cc25706d2dd0ff197f10af9e0f90

\Windows\SysWOW64\omsecor.exe

MD5 dccbc026aad295d09e2624368c05a590
SHA1 38e303bd00fa55efe4f113d4ed5dd2d944dcbe87
SHA256 2021003cb9a62e17c2c6796728273e34ab25752373ff7b3f4442af5a0309932a
SHA512 ba9a0ac50b8d9d3efd835bdcb6d215183d67dbbe00b2d08c8c040563f4cdb8feef3c89fe317c460e6412d263f9b1b793be1335a6a5f11afc9c54660e1c0d5dfb

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 4b76ac04cb6377c4c6bb65dcfe672108
SHA1 7637532dd4849b68b922323da353e4e19712dcae
SHA256 73cfa77b61d58acca607680f6c3402f38e0376a2cd27e02dbdf69d3e5a44ec7b
SHA512 ba66446126f7b3bab9d3fc0f2be4f66ea18974de4db1af7fbfcf6e5b28e4713724c6427b350c3202635557fc5e5e8f6da7cf1eb82d065253901c9dd3b9e63d8e

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-23 00:27

Reported

2024-05-23 00:29

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe

"C:\Users\Admin\AppData\Local\Temp\922b27fa2d195c9dfd1cc74db822718f0666eb062819a55761549f12ca49330b.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
NL 23.62.61.194:443 www.bing.com tcp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 194.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 73.91.225.64.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 ow5dirasuek.com udp
US 35.91.124.102:80 ow5dirasuek.com tcp
US 8.8.8.8:53 102.124.91.35.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 udp

Files

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 0be4f9ce60bd2c5f8871fb3dfc64131f
SHA1 ec093bb07d53b8efe5c6f5329c82aeec0600533d
SHA256 ede0341641abbbc6217190d86edb998d3491069493b21dfd267862d2ccfd3dda
SHA512 7ca146cac9789d13a1bbc6738e5433fece0d2d6ebd06313912d783b1f2c4befbd05941da1eadfa4634d990340d6a438c69d3cc25706d2dd0ff197f10af9e0f90

C:\Windows\SysWOW64\omsecor.exe

MD5 0b3183600ce292da928bde113f3d1c67
SHA1 d77090f287516a5c781e9ddc5231e4be4e01a36c
SHA256 bb3ec3594b24ca773614af2b9cd01c9d6195c9060ca54f1ef5a121ad06ef4fcd
SHA512 478f4b0d422413fff4afc0ba916d26b21c33d1e69ebfe9318e1f65e06092188996d3fdee17995811891894ef78316aabfefb8487b9008d383fca2a4991ba5f67

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 51667e1072743ccb30f844faa2bbb8a9
SHA1 51ba6042cd883f8ee3308f7406ae360841868a03
SHA256 2810c01bb6672b3c92ce6ffb27bb2eba2e68efc8cb493cef182a40058aa67dd0
SHA512 64c09df87d2a47e7da52504267c7c6f34c272c68130c167c1fd62d09933e6ac926caa4e1a5f4f1583dc35181a72869ad4de5593932804106b8c5b13318230d59