Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 19:48

General

  • Target

    3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe

  • Size

    35KB

  • MD5

    2ccd7f467f599c1b3415318e83551eb0

  • SHA1

    3431c0360c57f0d4d35d847394821663e5e72b65

  • SHA256

    3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405

  • SHA512

    13b780d7615730984e5143be42c33d14905c9681a75a57741b78d08c03c37d8b6e17e6ecb9f8073bc9b3544286b4a6517fbfc59e67d1a91f69f6a2e2bc8edddc

  • SSDEEP

    768:J6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:k8Z0kA7FHlO2OwOTUtKjpB

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe
    "C:\Users\Admin\AppData\Local\Temp\3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:4036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    35KB

    MD5

    28dcbb10946888a35e09005f71096727

    SHA1

    08db71ce1dfaad641cfb3378df2baaf5192ae916

    SHA256

    5506fe4418331495d39eae2705f0a06710348b7de6ac8170bf34acb03b8a45bf

    SHA512

    f125ba1f1f2aff2fdd3cc72e057b7f2a3a938e6f809e686542946bf1a84b725c16da5c4d66ef890ff5b4c4a5a9b4ea3e50cf8a4d51a8d870a01b837d3d80d413

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    35KB

    MD5

    eeacf6ffffd643c32c218d06f6878db4

    SHA1

    73dd79849894a65fc9f7da1f5b6501a89ca8f9f5

    SHA256

    be6a0b8bb8ed93c74af3299c7b2816a1ece6f4c1085454a6503bc360dcb1d680

    SHA512

    7a97dc7d113408701ed19dd851156b0691d3dd1af4bb09563a4146cb13e4cd22ce2b70d660eeaf3b6534b93af472bbb0760cf046335998fc6949f575fc952cd5

  • memory/3268-4-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/3268-8-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/3268-11-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/3268-14-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/3268-15-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/3268-22-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4036-19-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4036-23-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4808-0-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/4808-7-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB