Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 21:15

General

  • Target

    2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe

  • Size

    76KB

  • MD5

    1d5068159e726464c241156656cdb657

  • SHA1

    091f1d503d1b064e894690bd97c24102ac9a8737

  • SHA256

    2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783

  • SHA512

    515c222061d450fd686c384efeebe55ad7bf44c4ef73789d6262e7f0bbd2547ab8ec63f4991bae687f47c57059d76f579ca365518d624a0ea52f889644bc39a6

  • SSDEEP

    1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:XdseIOMEZEyFjEOFqaiQm5l/5w11H

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe
    "C:\Users\Admin\AppData\Local\Temp\2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    66a2c31b3916d7cec1c2deb50342d249

    SHA1

    2a47d17e240c08541ed88934be5ad7a1110c00da

    SHA256

    76aec3689d9f98a213b5eccc20c68ccc4453ae045dec3d52d3ff172684cd7a3e

    SHA512

    89824cd571c455f1fc94a91e12d6b726fb70b45bfbf669e1ccf9818fde1dce041d0ca75a5e5ab144620a65ff51bd1e22c7ee4b61bec88f2d71a2bf1c659580f7

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    c93a5838747952c51fa7e19ff70004fb

    SHA1

    b4a70a0d05c59bec961f12f32378b38c03f33196

    SHA256

    03bc3e1478230a2830858666e08d924d03ff8d29e6ef7b285508326c4d96276f

    SHA512

    5cfaf6acf1c774fb9dc231a1859d0edebe2ce25027af97e42e199276f2ecc89ac17d66fc81fb1218abe33589379f460b38b1bff7e2758848d1f082f4b7effa5b

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    837d6aead372152ea6d52e8e4216ab15

    SHA1

    bba5eafd30bc2d9f69beaf5e79692866b79c891a

    SHA256

    e807c4345e102ffdfe127b11851c71d1211215b05fef153cc7305c02157ca7fe

    SHA512

    86837b2db09657b41b6a02456b6559387f79b2851bf100b45d4e9d55cbd38238f06af6bbf65a29c44b4d51452d8b7eca681f30ff7e46d750aed11e1c4d00b814

  • memory/536-28-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1720-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1720-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2052-38-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2052-36-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2308-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2308-22-0x0000000000320000-0x000000000034A000-memory.dmp

    Filesize

    168KB

  • memory/2308-23-0x0000000000320000-0x000000000034A000-memory.dmp

    Filesize

    168KB

  • memory/2308-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2308-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB