Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 20:33

General

  • Target

    470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe

  • Size

    71KB

  • MD5

    cc57cf9a8fcce284133dc40eacd710c0

  • SHA1

    a44cc04e818777e245724a71d1502e92edc39a72

  • SHA256

    470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006a

  • SHA512

    789269323fd940b3b980fcce475dbd6bf62c704133c5222b53975bafb09af4b5b43cddf6444e9d47394f7c5582e44116f18cabd1e1e7217effe7163ef3639032

  • SSDEEP

    1536:/d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:3dseIOMEZEyFjEOFqTiQmQDHIbH

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe
    "C:\Users\Admin\AppData\Local\Temp\470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    f627e48f8af241dca7a9e896aeda1e70

    SHA1

    bcb952b35f11c90c3969b83e32e4a2cd931d311c

    SHA256

    734a15bd9beb9b3a954d473d6d84f69c50c7004397a1f56242a664fefdd2e043

    SHA512

    ec5fe971c0565aa795025554464a430bb3b2c571e533006b7636cd5b4524920ffbb428e5d95e7787cbc59056fbfb314316d0774a6b0a49c90c45c39c296d5270

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    fd02dd2df34b1eea694eecc2fa903f51

    SHA1

    583e41733f7ba73431e3aa7f1851d568e6fc519f

    SHA256

    71ed84c59a2a833f709f0e61b1cfa64e914ec1cf00eaa7f64152b70b94f93112

    SHA512

    cd68ed295c12f066bb7438ccea2203c551f2a35c051d941141c3c7f806f333b752fe4aa2042396a27d075c01bd87781470b15e1f0b74707faebf0eda2059fa75

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    8bbcfcefd1cf7a6832e51ecfa088901b

    SHA1

    677d09677f1f36b82dce0a8d487a579646d1a326

    SHA256

    116561902938364a7ff4abf536895a26b1f2e725825a0e36970b45cce4f5cedc

    SHA512

    78e0729089b2c85cb0af707ad126a1b0f494c8aba3bf0666950b426ac1482ecf8e67bc30f68900c09001ef881b3573c874a645239deb328174ad56728edbdd55

  • memory/1096-40-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1096-38-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2032-36-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2716-10-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/2716-9-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2716-3-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/2716-13-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/2716-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2780-14-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2780-25-0x0000000000390000-0x00000000003BB000-memory.dmp

    Filesize

    172KB

  • memory/2780-27-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2780-19-0x0000000000390000-0x00000000003BB000-memory.dmp

    Filesize

    172KB