Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2024, 04:49

General

  • Target

    e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe

  • Size

    33KB

  • MD5

    d7c40a64b0459499352df149608e092a

  • SHA1

    da4fbf544f318a73fd942f181786273ded2f21c8

  • SHA256

    e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7

  • SHA512

    0747c603a2452753eacff673bb236865dfad713a341b94b7de8a1694f5d38621def56745588d5dfdb9e835b48b789d0c1e140702b698b8f0d4f41f380776e938

  • SSDEEP

    768:0fVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:0fVRztyHo8QNHTk0qE5fslvN/956q

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe
    "C:\Users\Admin\AppData\Local\Temp\e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    33KB

    MD5

    d027890a9809ac1b2b02e4bdf70f1a5e

    SHA1

    f9d4d618e911d33d40388e085ce435dfee497880

    SHA256

    113b1ba7a1b133fc325ff38308561774c2bee2805798d45b62c17ed65cd15084

    SHA512

    4c85800564c74daefdef07370653bf03167ef971c98ae8f4d0b3ac4a988364df47ca464c498836c22c76cdecc96ff9f4d774c55d7b4a47c9ab779ff61121d70c

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    33KB

    MD5

    5c4e31065a9199a78ede6553d5f7c7e5

    SHA1

    9544d2b5d8ccad2a2719b8ac72469d9ba38c3c03

    SHA256

    a18dbc2c05e49fc0a61232a045416b29ec59f3856b553253302f2426670b38f1

    SHA512

    32535e31e81914ebdad1dfa0244b14dce83de06be1470242b272f634e0df1886bea17aeb2c9b3963480b7db0a11a4809200048c3e052c93312cf6e4a7692f25f

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    33KB

    MD5

    bf321930805bc928cf7c16478188b37a

    SHA1

    33d50490f6b29a64393b38dca5857102eaf8e706

    SHA256

    c5e34b667c7364159e1773526be72609350650db2e81afec847c1107b5cbdcdc

    SHA512

    252195c2439c96bda21c80eb94dbb10f692134e4e195acba23437acd733b149ff3fe391c80f63762f56512c4cd9d515c275e5a84981711a4f2c7b1778c6787a0

  • memory/1232-28-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1232-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1840-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1840-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2884-29-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2884-31-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2884-34-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2992-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2992-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2992-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2992-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2992-23-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2992-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB