Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2024, 11:08

General

  • Target

    2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe

  • Size

    96KB

  • MD5

    413943c6ee13467286abb93e4f8959ff

  • SHA1

    5e6200d33110cfb5f18b7ac232dfc05c5b09b61f

  • SHA256

    2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d

  • SHA512

    885e2779c74cd0b6ee8b4731d215301e8f174f9e0f29cdddb19ace8d580c1cfec4252f807b2278972ea0c54ee41ac86c920865d30a825d39499d72be8edd3210

  • SSDEEP

    1536:wnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx5:wGs8cd8eXlYairZYqMddH135

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe
    "C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe
      C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2240
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3852
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4456
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2996
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4632
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 268
                  8⤵
                  • Program crash
                  PID:4968
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 304
              6⤵
              • Program crash
              PID:544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 300
          4⤵
          • Program crash
          PID:1064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 288
      2⤵
      • Program crash
      PID:2296
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3784 -ip 3784
    1⤵
      PID:2228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3212 -ip 3212
      1⤵
        PID:1208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3852 -ip 3852
        1⤵
          PID:2020
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2996 -ip 2996
          1⤵
            PID:532

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            a75de2f488ea7096cacc1b1b5e98082b

            SHA1

            956ae8c09523f7192fae8b0873a4d9ef2c400720

            SHA256

            c3fba48917e6d679999a568a8ce6ab67234b006d0fe7a8b2d89d986eb078c5e4

            SHA512

            a730bcb8ac2240350f57b0fb3affedebc9e283f8d954513a2ca2faaca2c24b50539ffcb89e62e0e8c2976b7b2f3b1032064f0d03739dfd7db701de9cb05157fa

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            884c6ba9da110dabdca212d37e1484f2

            SHA1

            00a8c7a9a954f4cd30d5de62a0fe987e9cd2b166

            SHA256

            c02f66c916ebf10d40b98bef3f9c6ca67425397a1ccb9baee9cae4b66df369c7

            SHA512

            67e4f10c62fda2b403dfba087b403619fcd3d7d7d3c6bbbafa593f47a6acb4425fdb6950da8e763833816e5bcd46a93d23be69c07c8a4085942d7f621efe8f10

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            57947c1bbd45266c438d861c3601694c

            SHA1

            c3fe42ae77f33960430b6844392b736a9d272c52

            SHA256

            f3971ced4c84f8ed5474ebc08b74658e7ff54c559d978918fd4adee3fe676319

            SHA512

            470a9359ea85e7747f08e29835250e7266a894c2d7269cd869dc5dddb7e73d5097f00180ebeef1f77167a182f36d78696e351bb0aafb6d0fd55021049bae871e

          • memory/1404-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1404-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1404-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1404-10-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2240-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2240-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2240-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2240-30-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2240-19-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2240-22-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2240-25-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2996-44-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3212-11-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3212-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3784-18-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3784-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3852-32-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3852-51-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4456-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4456-36-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4456-39-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4632-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4632-48-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4632-53-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4632-56-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB