Analysis

  • max time kernel
    114s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2024, 13:59

General

  • Target

    3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe

  • Size

    90KB

  • MD5

    7596de0a78134f47afbb252e8de31240

  • SHA1

    18de0d3f4a4873a1c7473458bc1f8c9cc76ec844

  • SHA256

    3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70

  • SHA512

    c0af3672c3e645764b03743dbeae561f0211445378d396a714150e16518f2e9f1123ca0abc67cfdf8d8046531d68c2937a1abe53016523bf79cc6a2fd068ec44

  • SSDEEP

    768:OMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:ObIvYvZEyFKF6N4aS5AQmZTl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe
    "C:\Users\Admin\AppData\Local\Temp\3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    69d79a779068b41b77dc8ea4b49ad27f

    SHA1

    59ec448d768d400a70185e364decf95df233acd5

    SHA256

    e931a9c1646b0058d11681456eddd4d2373a24ef7b772a4b7a02b8af7d4b7808

    SHA512

    83496f4bd9bdbae3d7ff68a9b0e2897d589ebbac86797dd45202bdeaf72eb4b04c36d033b0d801e6d4d7dac871f62e9268c30345133d867e0c1ec60ed3179c56

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    90KB

    MD5

    503dc8590d480fffdea58c0daa73eec1

    SHA1

    ffe6bdc51fe1bb738e260cb62e79edd9c61ba449

    SHA256

    a8c5b78a23afd3bbff4a3a550485a5fad0551be847d2bc4d0d2e1e4f03b1939a

    SHA512

    dca0f9336f5f0cb6e29d68ccf3b64b25334dcbd05a7943c1c93a4ca5a3a56a34285975c350ff3ece5ceaeee6463d5ab1a949245c8fe92de0d8afa6830f525840

  • memory/1496-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1496-14-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4240-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4240-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4240-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4624-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4624-5-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB