Analysis

  • max time kernel
    114s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 20:33

General

  • Target

    470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe

  • Size

    71KB

  • MD5

    cc57cf9a8fcce284133dc40eacd710c0

  • SHA1

    a44cc04e818777e245724a71d1502e92edc39a72

  • SHA256

    470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006a

  • SHA512

    789269323fd940b3b980fcce475dbd6bf62c704133c5222b53975bafb09af4b5b43cddf6444e9d47394f7c5582e44116f18cabd1e1e7217effe7163ef3639032

  • SSDEEP

    1536:/d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:3dseIOMEZEyFjEOFqTiQmQDHIbH

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe
    "C:\Users\Admin\AppData\Local\Temp\470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3908
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    251c6c1fb092d7be075b6aefab19b80d

    SHA1

    2a43a826ec3adcb2a5359b50d3827747a04351fc

    SHA256

    6e3a7cdc6143032411bb0de65f0b0a582c250a587d3f8138e3d21f546057b2f1

    SHA512

    271ef93f6f1a5fdac445097b183c4d3c993770c55f5bbb6a4443b294ca9b684469e4e2c58d91b2dccbc639591837325a77e0f83884bd7e8cea0e355d83d713bb

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    f627e48f8af241dca7a9e896aeda1e70

    SHA1

    bcb952b35f11c90c3969b83e32e4a2cd931d311c

    SHA256

    734a15bd9beb9b3a954d473d6d84f69c50c7004397a1f56242a664fefdd2e043

    SHA512

    ec5fe971c0565aa795025554464a430bb3b2c571e533006b7636cd5b4524920ffbb428e5d95e7787cbc59056fbfb314316d0774a6b0a49c90c45c39c296d5270

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    b6b22e5d473d0cfe4311709fe8b28085

    SHA1

    01b477c4582712241e14569b72d6ee2c420a8a1c

    SHA256

    9a1604c398e5d8860f9a455746cfdc847e50ded0fc2399cd17578f531f147ede

    SHA512

    7fb09240ddf2676d5418e62528bd6d39d186759b2afd45f81fe48ee9dc41e28ef79a3c437989de385dc9dc58856e800df47c62e0805f51b57a0e3fe444af1529

  • memory/3908-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3908-18-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4020-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4020-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4020-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4080-17-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4080-20-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4496-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4496-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB