Analysis

  • max time kernel
    103s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 21:56

General

  • Target

    510138df9c055f2bb7bb37e68e22db60N.exe

  • Size

    90KB

  • MD5

    510138df9c055f2bb7bb37e68e22db60

  • SHA1

    b93486d62424df7b83cf46d0fbbcea373f826dba

  • SHA256

    0117d8930964691fba6d990de06ac46efb9ef87559433c508ce6d61dadaec4b6

  • SHA512

    de822c6ca0074c15fbe3a21403aa521aad496e1a4aa857731caae27ff628c08e5256c76c0c25081a072f576d9f9b9e5c811276f483423da9f34120648d4c2261

  • SSDEEP

    768:OMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:ObIvYvZEyFKF6N4aS5AQmZTl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\510138df9c055f2bb7bb37e68e22db60N.exe
    "C:\Users\Admin\AppData\Local\Temp\510138df9c055f2bb7bb37e68e22db60N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3900
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3224

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\omsecor.exe

          Filesize

          90KB

          MD5

          6e09d4f9463fec301d1fab3fb4f50ae0

          SHA1

          828428cb76dcf63542c77c039a07905f4f0bae4d

          SHA256

          a6115dc6f0c2f94e86dc136d8171d24772e10fbd10c56af0249adeab819f4170

          SHA512

          0b93cc68dc014a7e8e9b48e0442920f6df040bf5184eb04eac5215ba106cad7a0c20b007f41156785b09befda2898f0991b8d7c863de77c39bfd34a489a9ce69

        • C:\Users\Admin\AppData\Roaming\omsecor.exe

          Filesize

          90KB

          MD5

          a3c004ca4270446d881cbd3004ae9388

          SHA1

          809faf652c011578e9487d111c72843b80e54a13

          SHA256

          4fb066b711b9365a8408d4d7bc9bc16df244608dd5ebaca8f34f3c51f5c60938

          SHA512

          f292ab95e77aef10f09efc0037f14c1da558295abbe201597fc75b7108c9998c5b193e7080e613c431a6e10c731d29faeeb168378ecffc461cf4f72213bffc14

        • C:\Windows\SysWOW64\omsecor.exe

          Filesize

          90KB

          MD5

          73f4967d06f6cbeb0c22eaf5b6eaa2ab

          SHA1

          643dc0fadb57c363187c9924a89e70a686225514

          SHA256

          3e642f860a87d3e14445d59481e1e93724984a9fbb95b36b756eaed9fa20e65d

          SHA512

          7b0f983f738b2f673ac5516bd6676da5557a09db2288852cea7b32f7ab89c9db18c187f52d67451c0780371dc008326dc6b5686425a5588686ed97add62158ab

        • memory/3224-18-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3224-20-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3476-11-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3476-17-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3900-5-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3900-7-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3900-12-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/5096-0-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/5096-6-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB