Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 20:22

General

  • Target

    f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe

  • Size

    80KB

  • MD5

    96118f09644ca13af64fe49b35b0e320

  • SHA1

    eed96488981cf3dff1697b845a8a0ff6ea6b0c08

  • SHA256

    f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d

  • SHA512

    5a8bf5d6bc2f621f42cde2bcea3b626b2501e913356b93c46a79019c633e0c59918708cfc85fe97abf7fd0f8a50cfe083a9975ae6d8a0a4cb994b5a2bf7f6e3d

  • SSDEEP

    768:6fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAq:6fbIvYvZEyFKF6N4yS+AQmZTl/5y

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
    "C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    9a311e2b1f74160cb44241e8f792e6f3

    SHA1

    dadf8b3a09e0f1b81f5fb15760fd6d1adee9445d

    SHA256

    77a3d2bbc0416b8a0735b2ac38178f44853ab6932a806b0576ad70355b5bec9f

    SHA512

    26214968b2cb10f12c6d4a7dac5ae9af3956b1e06485067fa9c52b055b97ec1c65a12d140c45d4bc639b34427fa0945288d36ffb8d777073377d876feeb8d867

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    0ea30f74509738757f1b6fca5a9f242e

    SHA1

    37bbf7375ce9a1c991a953b0762bcb116d555108

    SHA256

    19da053de320033b9e65d81147f68c5bfa160a9d666ca8ff0ae88c4d48f28a0a

    SHA512

    4549fab67344512e101e49b9413a2120a6466f34cebc08fecb0ecc77584abff0cc77aa430e080f07832b0ad59a8e33f3c5f60ed966ed36af12d64e95b48af3e2

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    533db1fce60771703eb5b9808fe8b24f

    SHA1

    6357c943ba55d9bc0c40b7179200f19a68d87a96

    SHA256

    82d9288e34fc6ab8597b69956e7aa0bffd8129c7c71f2537087b5f95546c6c22

    SHA512

    d91597b1e555a936f3f77186a258db84bb4fab155ac56480c4f95eefb404f8fed59064b77977a0024fc841081c771dd0196098612083f65d6576758eb9291fc3