Analysis Overview
SHA256
16331d6f1437dc842ff61774b7f71f2e951cb2e259282a6e25314b9e2d87db5c
Threat Level: Known bad
The file 16331d6f1437dc842ff61774b7f71f2e951cb2e259282a6e25314b9e2d87db5c was found to be: Known bad.
Malicious Activity Summary
Neconyd
Neconyd family
Executes dropped EXE
Loads dropped DLL
Drops file in System32 directory
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-10 19:07
Signatures
Neconyd family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-10 19:07
Reported
2024-06-10 19:10
Platform
win7-20240508-en
Max time kernel
146s
Max time network
149s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\16331d6f1437dc842ff61774b7f71f2e951cb2e259282a6e25314b9e2d87db5c.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\16331d6f1437dc842ff61774b7f71f2e951cb2e259282a6e25314b9e2d87db5c.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\16331d6f1437dc842ff61774b7f71f2e951cb2e259282a6e25314b9e2d87db5c.exe
"C:\Users\Admin\AppData\Local\Temp\16331d6f1437dc842ff61774b7f71f2e951cb2e259282a6e25314b9e2d87db5c.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
Files
memory/3008-1-0x0000000000400000-0x000000000042B000-memory.dmp
memory/3008-9-0x0000000000400000-0x000000000042B000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | e1979a757a663d0d47976310da3a2fcb |
| SHA1 | 9e5073caac16ef7810beeca6e80d58324e102a38 |
| SHA256 | 6ddf688fa5afce979fcd073964f7175ec38854b7e8c1bf163ee3526b238ba8be |
| SHA512 | dc354566bd0fe60624b13bf2c91cdc099dc36b78842b137070f4fed841cbf40fe7392dcaac60d0c4ab8e5aafe3adf41dd707c5ef0b4c770523eefa30eed79134 |
memory/3040-10-0x0000000000400000-0x000000000042B000-memory.dmp
memory/3040-12-0x0000000000400000-0x000000000042B000-memory.dmp
\Windows\SysWOW64\omsecor.exe
| MD5 | b9c7c67da40253e812c0058589f7964d |
| SHA1 | baaaf608205cfdbb387eaa67eb9f827a587fe145 |
| SHA256 | 421ef27522d23a72d020b749c02e5ee8275c1fe598412c525d3c39365fe9877d |
| SHA512 | 95e086113c0aa1b0e1044d25327e433f552272498c82227dca8b12d2d0f68b823110776f29eee4edbfac7def092e81a8603b2663541fbca0bfa2ed8766963212 |
memory/3040-15-0x00000000004B0000-0x00000000004DB000-memory.dmp
memory/3040-22-0x0000000000400000-0x000000000042B000-memory.dmp
\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | db46a93fb4a2a2c492a8c9d21f301388 |
| SHA1 | 3f15f1bebd1cbf48225a59f5aa5129e1bedc9447 |
| SHA256 | 7c74e0c37f2e88b642e202a079f4656644d4ebe915054065746c8455bfb199df |
| SHA512 | c0bc448a845c2cb7f67ddf1560059ae72b69b9b61150d2a3550f3ed4046f7f1cd36a2df57c269fd5c1c6792125f5689ec6b63c9ecf22c1a95e7ebf8cc5721a8e |
memory/1940-33-0x0000000000220000-0x000000000024B000-memory.dmp
memory/1940-32-0x0000000000220000-0x000000000024B000-memory.dmp
memory/1940-34-0x0000000000400000-0x000000000042B000-memory.dmp
memory/1976-36-0x0000000000400000-0x000000000042B000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-10 19:07
Reported
2024-06-10 19:10
Platform
win10v2004-20240508-en
Max time kernel
142s
Max time network
139s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\16331d6f1437dc842ff61774b7f71f2e951cb2e259282a6e25314b9e2d87db5c.exe
"C:\Users\Admin\AppData\Local\Temp\16331d6f1437dc842ff61774b7f71f2e951cb2e259282a6e25314b9e2d87db5c.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
Files
memory/3032-0-0x0000000000400000-0x000000000042B000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | e1979a757a663d0d47976310da3a2fcb |
| SHA1 | 9e5073caac16ef7810beeca6e80d58324e102a38 |
| SHA256 | 6ddf688fa5afce979fcd073964f7175ec38854b7e8c1bf163ee3526b238ba8be |
| SHA512 | dc354566bd0fe60624b13bf2c91cdc099dc36b78842b137070f4fed841cbf40fe7392dcaac60d0c4ab8e5aafe3adf41dd707c5ef0b4c770523eefa30eed79134 |
memory/5020-4-0x0000000000400000-0x000000000042B000-memory.dmp
memory/3032-6-0x0000000000400000-0x000000000042B000-memory.dmp
memory/5020-7-0x0000000000400000-0x000000000042B000-memory.dmp
C:\Windows\SysWOW64\omsecor.exe
| MD5 | b4bbe071fb4157bdbd1acc95b1d8a926 |
| SHA1 | d9b40a14bc1ecae2a5d8663dfa804fab967f6224 |
| SHA256 | c7c78a450b292a0605d157c4cd356fe1e781921cebaf8b4d7893c446bcce26af |
| SHA512 | 7d30484f6d96089617e6fbeba0f91dc223471284edb47afee673cf8b8f0578e9165115005e81228378ee70428f8d902e028728b21473e54d9b8199dcbd24663a |
memory/1432-13-0x0000000000400000-0x000000000042B000-memory.dmp
memory/1432-18-0x0000000000400000-0x000000000042B000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 1807f84b8d5487a93b0dc2e603e552ca |
| SHA1 | c1a37a6e60b0e9712de5771077f0204ffc05e48f |
| SHA256 | ce68dff961db96341f008ecf18fc0522545c43016c8a2575274513a7064b136b |
| SHA512 | 66ae644fdde1e2b1daf7a24e3c73d9d09d97f442c53d1b666851ac4e301a45b14b9173a0c9afe55636bef22f49568d0e6788a7600b551eae4df7d0df57f67a6e |
memory/4696-17-0x0000000000400000-0x000000000042B000-memory.dmp
memory/5020-12-0x0000000000400000-0x000000000042B000-memory.dmp
memory/4696-20-0x0000000000400000-0x000000000042B000-memory.dmp