Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 20:22

General

  • Target

    f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe

  • Size

    80KB

  • MD5

    96118f09644ca13af64fe49b35b0e320

  • SHA1

    eed96488981cf3dff1697b845a8a0ff6ea6b0c08

  • SHA256

    f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d

  • SHA512

    5a8bf5d6bc2f621f42cde2bcea3b626b2501e913356b93c46a79019c633e0c59918708cfc85fe97abf7fd0f8a50cfe083a9975ae6d8a0a4cb994b5a2bf7f6e3d

  • SSDEEP

    768:6fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAq:6fbIvYvZEyFKF6N4yS+AQmZTl/5y

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
    "C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    9a311e2b1f74160cb44241e8f792e6f3

    SHA1

    dadf8b3a09e0f1b81f5fb15760fd6d1adee9445d

    SHA256

    77a3d2bbc0416b8a0735b2ac38178f44853ab6932a806b0576ad70355b5bec9f

    SHA512

    26214968b2cb10f12c6d4a7dac5ae9af3956b1e06485067fa9c52b055b97ec1c65a12d140c45d4bc639b34427fa0945288d36ffb8d777073377d876feeb8d867

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    71d5e6a0440ef7b480ab62aeb483abd2

    SHA1

    607d82c384a05badf828f72b3ea19b445255e7c8

    SHA256

    1f4c814fb6668ac7d52a5a0a18678ebfef7c1777194ac364ae0e952826e3259d

    SHA512

    d239c9d2c5441a71b3bed4bf09fa7a1a2c395abb7c5bbd5c2eff51dbb1a0743b6d70a9e69b402c1a57b33e822d3ec7094b38437074de407a85183d4bbc49993e