Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 21:15

General

  • Target

    2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe

  • Size

    76KB

  • MD5

    1d5068159e726464c241156656cdb657

  • SHA1

    091f1d503d1b064e894690bd97c24102ac9a8737

  • SHA256

    2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783

  • SHA512

    515c222061d450fd686c384efeebe55ad7bf44c4ef73789d6262e7f0bbd2547ab8ec63f4991bae687f47c57059d76f579ca365518d624a0ea52f889644bc39a6

  • SSDEEP

    1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:XdseIOMEZEyFjEOFqaiQm5l/5w11H

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe
    "C:\Users\Admin\AppData\Local\Temp\2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:908
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    66a2c31b3916d7cec1c2deb50342d249

    SHA1

    2a47d17e240c08541ed88934be5ad7a1110c00da

    SHA256

    76aec3689d9f98a213b5eccc20c68ccc4453ae045dec3d52d3ff172684cd7a3e

    SHA512

    89824cd571c455f1fc94a91e12d6b726fb70b45bfbf669e1ccf9818fde1dce041d0ca75a5e5ab144620a65ff51bd1e22c7ee4b61bec88f2d71a2bf1c659580f7

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    e8ed50cb2882425567cab7645bb37b0e

    SHA1

    1fea5e0b7324e49646f6a249763b4d65e3f2f0b7

    SHA256

    4f9ffee165111e0cdc63f437bff9124fc9c64809d425d1a4ad1ee36cc788605f

    SHA512

    e642fb62be23e132d9e85cfb85d60999711ac14a9ee6628ce979a1689c55cf3ef3a47c8ae930c82559b5cbd2516ce74d1b693b6e26d2f0c40ce6cf55e6e4b856

  • memory/532-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/532-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/908-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/908-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1972-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1972-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1972-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB