Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 07:32

General

  • Target

    b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe

  • Size

    71KB

  • MD5

    6d3c3df79012ec40a3ba1614656c0099

  • SHA1

    0b55f5ceec915b607b1affdd2e95ceee903a4ff9

  • SHA256

    b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92

  • SHA512

    0e8e040f70d984097b83907da7e46c428b7910034ae529d365d6cd5490ac908015737a0c38e9ef426a38d2b2dd25b70ccd041c5014bd7dc137404ac9ec2caa5b

  • SSDEEP

    1536:gd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHF:AdseIOMEZEyFjEOFqTiQmQDHIbHF

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
    "C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2896
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    544831c578b4780d95ba804000b0f67d

    SHA1

    333ab43ae921baf46763ad5de733e6551e7949ba

    SHA256

    2d94dac9e53702b513c338196f3c56a5c49978a6c3b2a863591d4310447b84ce

    SHA512

    96d9c7fac6f9c3122c98f9798adb74cc7a5730696262e368bd4583f1e8548ebf3e521b76ad94ff3fab433bdd080fcf91efbf055eaa175d76af419cd4d5273434

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    b5e9ad108b7e1515b83f8ec4b63ecacb

    SHA1

    1743f9ddb40d39a15f0399b09eaf47a8f5be9097

    SHA256

    8e74ffbe47f70408efd22ff498ed39d7255fe56474dc0c3363de1008151e344d

    SHA512

    cc9618ac5b10e01f3ace4c65717cb888854a0563ad2a1434aca8fa457a55a1190ea8e606ecd171f02cf75b3f6c24e416b814101b2e6a95189f77ab84228bdb04

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    68b4b83402a6798bccc699998a5ea54f

    SHA1

    e1159decdda9677671481ad6a86fa8f079fb6008

    SHA256

    f8c0b67032eb8aa84f474457af44d8ebf4a83dd3bfe7856f9c29599cdec2501c

    SHA512

    70e836b9e5ad501af079ca3025f3c29558d011b416b18467a26dc7ee5793f4184234eb8278de8f1c730540fd3cf041478654819b08c7bb675e083a26152d8180

  • memory/1692-4-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/1692-1-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1692-9-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/1856-36-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1856-38-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2380-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2380-17-0x00000000007A0000-0x00000000007CB000-memory.dmp

    Filesize

    172KB

  • memory/2380-25-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2380-22-0x00000000007A0000-0x00000000007CB000-memory.dmp

    Filesize

    172KB

  • memory/2896-28-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB