Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2024, 00:05

General

  • Target

    74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe

  • Size

    88KB

  • MD5

    14c8829e10b2cc00a771adaef1f721b9

  • SHA1

    d1a5ca499844c45c49a4e253523029fb1e8fc91c

  • SHA256

    74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c

  • SHA512

    4c588b566c9fbe21e54b556427d68de67a74c8810631c4f4aad1a259dc9f557c83f9547fb927658f5396bdebce325fdb38e3af5394ac33e44014da37a252f509

  • SSDEEP

    768:gMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:gbIvYvZEyFKF6N4yS+AQmZTl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe
    "C:\Users\Admin\AppData\Local\Temp\74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    88KB

    MD5

    4ca40ea30d1a91a2bd3c64c006e6a2cc

    SHA1

    dd4c38d763eb5224547fde386fe5de1d390d6fb4

    SHA256

    d4eb2be62113ef15a7b861f16ed480a097c4d1fc1c1b8a75420f1b146a09bbdf

    SHA512

    017726f5e56d9844bff88137434a7cf27942acb4d5e86cb3a957c7d0bc683dc4ab1405b86b78a852068d5fb2919f03867a92211b372166d196559d2342f6a264

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    88KB

    MD5

    66004004f0d6b0e0a74e6549f9c33001

    SHA1

    91ba15e244aa359876a0f7ec1ba453803cf2742b

    SHA256

    4aa68ab79d7d8bfd1a4bdfff0d6e3acdca7d6ae8b25406df7340ee61f39188ea

    SHA512

    1bcbb59f458328a3e427c2575526317a17d9175a228edbd6950844c2c5e7a5eff9a21cd41662f3f13adb9b0ae32420825221ac6a2f7e2bf9fce38dca233bd23d

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    88KB

    MD5

    b6c3068d394867676711394f5919f437

    SHA1

    2d3280eb338cb22efb55500dced5cb2178839b6d

    SHA256

    851e0cde6a8403543553b0a111d675b40422284f71bc12067b92593facf89892

    SHA512

    7e648938433abf13a8ed2b20b849dc77ccd08fc29556cb3fbb2348bb723756a2fd3f2c4bc6855c98d8bbe7e0e05406c248dbe37ac13f416ebdb1981f3e3947a8