Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 20:12

General

  • Target

    f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe

  • Size

    80KB

  • MD5

    96118f09644ca13af64fe49b35b0e320

  • SHA1

    eed96488981cf3dff1697b845a8a0ff6ea6b0c08

  • SHA256

    f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d

  • SHA512

    5a8bf5d6bc2f621f42cde2bcea3b626b2501e913356b93c46a79019c633e0c59918708cfc85fe97abf7fd0f8a50cfe083a9975ae6d8a0a4cb994b5a2bf7f6e3d

  • SSDEEP

    768:6fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAq:6fbIvYvZEyFKF6N4yS+AQmZTl/5y

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
    "C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    9a311e2b1f74160cb44241e8f792e6f3

    SHA1

    dadf8b3a09e0f1b81f5fb15760fd6d1adee9445d

    SHA256

    77a3d2bbc0416b8a0735b2ac38178f44853ab6932a806b0576ad70355b5bec9f

    SHA512

    26214968b2cb10f12c6d4a7dac5ae9af3956b1e06485067fa9c52b055b97ec1c65a12d140c45d4bc639b34427fa0945288d36ffb8d777073377d876feeb8d867

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    8898a61c920b728b23146d691a49a2fa

    SHA1

    2ebe0bb83ba38d3b4a515c776ec0580e79c0512a

    SHA256

    2efa4475eb79d3529a94d31a0b256dea0a2e818fd4fbd43db1f472089d70ac62

    SHA512

    b20de666de9b8b1204039cf19e8fdec9a0d761a353e5beb1c803775115e8783607f780a65a919613b9f0174552d48339ee6b0577bc8ec7e8930ce4336edb88ec

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    5d73cc13d3da22253b8ee292cc01bbf7

    SHA1

    ad0c222aae9c286ed1b19e9753de5b77bb737910

    SHA256

    806745dfb210fcd621aa819ecdf0dc2c3ec7d07fe3cd6b262a7ea8e18ba2c404

    SHA512

    48576d22050aa5a51f78d04058deb8757434b0c3aa79f2bcb6d8af70b67391cd91cc0b08964a1e44ded4db689429cc22e3fea9a55de9ff0bfb13b69a007ac108