Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2024, 13:59

General

  • Target

    3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe

  • Size

    90KB

  • MD5

    7596de0a78134f47afbb252e8de31240

  • SHA1

    18de0d3f4a4873a1c7473458bc1f8c9cc76ec844

  • SHA256

    3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70

  • SHA512

    c0af3672c3e645764b03743dbeae561f0211445378d396a714150e16518f2e9f1123ca0abc67cfdf8d8046531d68c2937a1abe53016523bf79cc6a2fd068ec44

  • SSDEEP

    768:OMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:ObIvYvZEyFKF6N4aS5AQmZTl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe
    "C:\Users\Admin\AppData\Local\Temp\3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    69d79a779068b41b77dc8ea4b49ad27f

    SHA1

    59ec448d768d400a70185e364decf95df233acd5

    SHA256

    e931a9c1646b0058d11681456eddd4d2373a24ef7b772a4b7a02b8af7d4b7808

    SHA512

    83496f4bd9bdbae3d7ff68a9b0e2897d589ebbac86797dd45202bdeaf72eb4b04c36d033b0d801e6d4d7dac871f62e9268c30345133d867e0c1ec60ed3179c56

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    269a7b84d3d1ad254f286fcd73a1f949

    SHA1

    5853386484b4956c30b2a247652c1f54c48af2ca

    SHA256

    140960f6757aa183015b75fce14cadd3fb7765f8ac1830123253ea7ad94b72ae

    SHA512

    0fa9a8945be8063f84c577f8dbfb7713b0d03dfa42e6e5e70d6fa314670dae45787766e5a4e77b7b27eb97e5e6969bc230ca662e898463dd8aa22951fc19161b

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    90KB

    MD5

    497c9190b4774d9ee867617db7718e79

    SHA1

    2a50a238b059217441f8ddc267f6e29c3f87245a

    SHA256

    7fb6a68c7c83930cba5c1fea42a6fd95702e3c006170def370525476e5859411

    SHA512

    c36f84ba89ecc2d03c13449ce22557c55483f4ffef78a1043b7f19677dd2999eb9db8a2f07a23ba2511babd145af06a3200d43d3cb31925b563877d7e1d862db

  • memory/2188-23-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2188-10-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2188-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2188-17-0x00000000020A0000-0x00000000020CB000-memory.dmp

    Filesize

    172KB

  • memory/2280-8-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2280-1-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2832-25-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2832-30-0x00000000001B0000-0x00000000001DB000-memory.dmp

    Filesize

    172KB

  • memory/2832-37-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2916-38-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB