Analysis

  • max time kernel
    115s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 01:06

General

  • Target

    35d169697df95ece88cdb45be600da00N.exe

  • Size

    92KB

  • MD5

    35d169697df95ece88cdb45be600da00

  • SHA1

    ecc32b2cf68235b05a0e6fb5895c993d856a676a

  • SHA256

    4cb824c73e64179c5940c44df44c3c8477e49b52b10749948c69b1e7e90d8ba9

  • SHA512

    48cfaf5cfd4fa1bea9d5647a6e81988605c1551e6ba3a713ab6ca646f1c128f8cf42797c9e3b9ab3b8b85b9f6997fc1080a3d8094bc1418429f9439d147d7e33

  • SSDEEP

    1536:+d9dseIOcEE3bIvYvZEyF4EEOF6N4yS+AQmZTl/5:mdseIO/EZEyFjEOFqTiQm5l/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35d169697df95ece88cdb45be600da00N.exe
    "C:\Users\Admin\AppData\Local\Temp\35d169697df95ece88cdb45be600da00N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\omsecor.exe

          Filesize

          92KB

          MD5

          3162a6482e6d6dbb960e3a9eacdd4814

          SHA1

          4c0634cb5ec1255e4234949133e4fd3fac582118

          SHA256

          bf792120f7db4f00a9f164c4a3f41877ab13fed25aa4d28dd9e10df73b99e6c9

          SHA512

          252023d933eb16b5b06093735c59bb41c93e52fcd56818ee9cb618902c715cc229ea75d35ac63e91d2900344b37de28d197c8e618da8ec76e62c51e0ab4b53bb

        • C:\Users\Admin\AppData\Roaming\omsecor.exe

          Filesize

          92KB

          MD5

          d8a214a105c9cc3c6119a325b1f4ea81

          SHA1

          270bd1e99c8d8e1901d43e340ddc9b07715590a5

          SHA256

          f6ece1f99007abb409ab2d1d88a2ac58c6dbb27f6b521fc3cd6beb0c9252c58d

          SHA512

          9b601494ce955f42cd534449650a95f77ce381e61a27b681a877aaea4659532de579910301128616829b2bf29a416e0d594844cc18b5449f302e525927cc0857

        • C:\Windows\SysWOW64\omsecor.exe

          Filesize

          92KB

          MD5

          5dde16ab4847f31a27f1be523625e175

          SHA1

          8aa8f46fa152a7ba1f082b60be0f04d07e94b8c7

          SHA256

          3128b476f578766b30ed54682960bb931ff3c6be65c5d70cce7e75b68ca13597

          SHA512

          bf411baa4f08d9e9e34f0eacfcda4b5f8b625b1994828328f6a85d82db5e07a60fda7447bd4bd5c87bd49eea7c3b968ac16bc50cb929d859d7106900e25686cd

        • memory/1772-0-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/1772-6-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/2624-13-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/2624-19-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/2636-5-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/2636-7-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/2636-12-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/4592-18-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/4592-20-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB