Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 22:37

General

  • Target

    00a315aaac97173b5fe64ad100cb4e50N.exe

  • Size

    35KB

  • MD5

    00a315aaac97173b5fe64ad100cb4e50

  • SHA1

    e921047c84a3b220d49977e77774c2d23fa28513

  • SHA256

    4c9b7dfdee5be1f7f0a9cf8f956356b714af56ea4d0be0d68fbddbbbd1d45b83

  • SHA512

    1ef40587b1142e5a112847e4517703e1f9a50a1c672902fb3d0c34fc8bcf39724c80bf78c4180209a3ac458a526c288ffb95a4087f58b991bf39e679547d3366

  • SSDEEP

    768:j6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:e8Z0kA7FHlO2OwOTUtKjpB

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a315aaac97173b5fe64ad100cb4e50N.exe
    "C:\Users\Admin\AppData\Local\Temp\00a315aaac97173b5fe64ad100cb4e50N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    35KB

    MD5

    6f3b7e99495037e649d56b3dc2caa544

    SHA1

    f7f77af41d722fa0ebb16c7349f268dac5466014

    SHA256

    03bddd16e186ae253d3e89363c8e5f0aa3fee3bad5499908d06d7316186e3753

    SHA512

    56f03a4ef0174c754d3e1411ac8dbef9e442caf5d34afa9f2161146e0ed5fa48392321cd0fe46dac86576ae47533eb124808666c853af799ee3638f73a1db3bb

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    35KB

    MD5

    15ead224227a015ab61818d94126543f

    SHA1

    cfd84dafde4ddcf843352ae820abbc185a23d0e5

    SHA256

    b83b94c1185f596dc7ab2ff2d616ee98bb7b392b3c00b58b4fbcaf81a13124a2

    SHA512

    548d81e8dd00fd8e17216747fbc9adc8f75a93163f6492d1cfcccb2a0ecae85eea5351b1be8037910ad687eeb5441bd3625bcccb98dd452130803fa66480cb4e

  • memory/896-5-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/896-8-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/896-11-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/896-14-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/896-15-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/896-22-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1124-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1124-7-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1452-19-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/1452-23-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB