Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 16:17 UTC

General

  • Target

    f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe

  • Size

    134KB

  • MD5

    5cf128e2139b580fd6b33ea1efa43ae0

  • SHA1

    8ce6f2b0ead61caca11efdd3b7d4ce7dbb04c636

  • SHA256

    f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4

  • SHA512

    c6cebabac412e9c6c3edf31aba092a72c5100ec95f2c772dc3c10dd258de1ac93103280b6ed91ac94b0fb07f0abec3fbd05cb2614f5a1f73616e2face399d224

  • SSDEEP

    1536:+DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:giRTeH0iqAW6J6f1tqF6dngNmaZCia

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe
    "C:\Users\Admin\AppData\Local\Temp\f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe
      C:\Users\Admin\AppData\Local\Temp\f9dbeeed5beba8aca4e7d4207719925724c89a643479a5dfc1cea2a5517b71d4N.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1904
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1924
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1524

Network

  • flag-us
    DNS
    lousta.net
    omsecor.exe
    Remote address:
    8.8.8.8:53
    Request
    lousta.net
    IN A
    Response
    lousta.net
    IN A
    193.166.255.171
  • flag-fi
    GET
    http://lousta.net/945/59.html
    omsecor.exe
    Remote address:
    193.166.255.171:80
    Request
    GET /945/59.html HTTP/1.1
    From: 133726186574028000
    Via: bjledplYpdq;6+3]^mc`;4Yn`m_l8//+./.0]jq<1/0,\j`w<\a0a3aad62040b5\b/a1a.5c-27`b40`
    Host: lousta.net
    Connection: Keep-Alive
  • flag-us
    DNS
    mkkuei4kdsz.com
    omsecor.exe
    Remote address:
    8.8.8.8:53
    Request
    mkkuei4kdsz.com
    IN A
    Response
    mkkuei4kdsz.com
    IN A
    3.33.243.145
    mkkuei4kdsz.com
    IN A
    15.197.204.56
  • flag-us
    GET
    http://mkkuei4kdsz.com/806/632.html
    omsecor.exe
    Remote address:
    3.33.243.145:80
    Request
    GET /806/632.html HTTP/1.1
    From: 133726186574028000
    Via: bjledplYpdq;6+3]^mc`;4Yn`m_l8//+./.0]jq<1/0,\j`w<\a0a3aad62040b5\b/a1a.5c-27`b40`
    Host: mkkuei4kdsz.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: openresty
    Date: Sat, 05 Oct 2024 16:18:40 GMT
    Content-Type: text/html
    Content-Length: 114
    Connection: keep-alive
  • flag-us
    DNS
    ow5dirasuek.com
    omsecor.exe
    Remote address:
    8.8.8.8:53
    Request
    ow5dirasuek.com
    IN A
    Response
    ow5dirasuek.com
    IN A
    52.34.198.229
  • flag-us
    GET
    http://ow5dirasuek.com/863/729.html
    omsecor.exe
    Remote address:
    52.34.198.229:80
    Request
    GET /863/729.html HTTP/1.1
    From: 133726186574028000
    Via: bjledplYpdq;6+3]^mc`;4Yn`m_l8//+./.0]jq<1/0,\j`w<\a0a3aad62040b5\b/a1a.5c-27`b40`
    Host: ow5dirasuek.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Sat, 05 Oct 2024 16:18:51 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: close
    Set-Cookie: btst=afebf5c4b33a4f4ec0f50dc98e7f83d1|138.199.29.44|1728145131|1728145131|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
    Set-Cookie: snkz=138.199.29.44; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
  • 193.166.255.171:80
    http://lousta.net/945/59.html
    http
    omsecor.exe
    323 B
    132 B
    3
    3

    HTTP Request

    GET http://lousta.net/945/59.html
  • 193.166.255.171:80
    lousta.net
    omsecor.exe
    152 B
    3
  • 193.166.255.171:80
    lousta.net
    omsecor.exe
    152 B
    3
  • 3.33.243.145:80
    http://mkkuei4kdsz.com/806/632.html
    http
    omsecor.exe
    427 B
    690 B
    5
    4

    HTTP Request

    GET http://mkkuei4kdsz.com/806/632.html

    HTTP Response

    200
  • 52.34.198.229:80
    http://ow5dirasuek.com/863/729.html
    http
    omsecor.exe
    421 B
    621 B
    5
    5

    HTTP Request

    GET http://ow5dirasuek.com/863/729.html

    HTTP Response

    200
  • 193.166.255.171:80
    lousta.net
    omsecor.exe
    152 B
    3
  • 193.166.255.171:80
    lousta.net
    omsecor.exe
    104 B
    2
  • 8.8.8.8:53
    lousta.net
    dns
    omsecor.exe
    56 B
    72 B
    1
    1

    DNS Request

    lousta.net

    DNS Response

    193.166.255.171

  • 8.8.8.8:53
    mkkuei4kdsz.com
    dns
    omsecor.exe
    61 B
    93 B
    1
    1

    DNS Request

    mkkuei4kdsz.com

    DNS Response

    3.33.243.145
    15.197.204.56

  • 8.8.8.8:53
    ow5dirasuek.com
    dns
    omsecor.exe
    61 B
    77 B
    1
    1

    DNS Request

    ow5dirasuek.com

    DNS Response

    52.34.198.229

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    134KB

    MD5

    828a5448e352a307c1bd8cd0cf84380d

    SHA1

    855c2f625af2b77ecb30ddcf649200cfe0a6de67

    SHA256

    779a27f95728e26e69f84ea44f809b779d6f3f6cb65bcf1313bd34d543b9f2a7

    SHA512

    4d270e8183bd8cfd06dc1bd2d6c15f6b502ec8df8fb6ee9c671e3eaf9337c9729a0f202b89242a51b76fb6c24c360e194a59ff2f5fc712088018eec326dda1a4

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    134KB

    MD5

    293301a2006a710602549247f16b8b19

    SHA1

    53302ee922849b490722bc7af8c3624749a19b2a

    SHA256

    06a92952733e3df28a4994d3650fd2a97273c6665e722be147f96ac819fe4381

    SHA512

    97a3702361a4b3b2c023d68ef1d02a448768d92a5eaf8de3b62af76067cc777b16dc493c4b749d38998377f54a52332f1bf45a3482200f847948b44662d10d09

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    134KB

    MD5

    66d03123f1da017afc56e7fc134e8c80

    SHA1

    6936dedd4c546d512ee9bfc19fae88f730aa787b

    SHA256

    504d960265ed313c8f0b1b00e7ca9d51cdbbe10aa57a621cb912d1edf2253a47

    SHA512

    9be633950351fd24831396669fcb9605d448f4c3d3b80ae08b2d64841a45d5ec5f1095cde540afa4b3af27a12bf64b34d545d1d4e20b69f05e7e37d921d31d39

  • memory/1352-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1352-43-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1352-46-0x0000000000390000-0x00000000003B4000-memory.dmp

    Filesize

    144KB

  • memory/1352-34-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1352-35-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1352-40-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1524-86-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1924-84-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/1924-77-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2216-6-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2216-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2216-33-0x00000000001C0000-0x00000000001E4000-memory.dmp

    Filesize

    144KB

  • memory/2600-56-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2600-63-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2660-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2660-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2660-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2660-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2660-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2688-30-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2688-20-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2688-23-0x0000000000330000-0x0000000000354000-memory.dmp

    Filesize

    144KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.