Analysis

  • max time kernel
    114s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 07:32

General

  • Target

    b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe

  • Size

    71KB

  • MD5

    6d3c3df79012ec40a3ba1614656c0099

  • SHA1

    0b55f5ceec915b607b1affdd2e95ceee903a4ff9

  • SHA256

    b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92

  • SHA512

    0e8e040f70d984097b83907da7e46c428b7910034ae529d365d6cd5490ac908015737a0c38e9ef426a38d2b2dd25b70ccd041c5014bd7dc137404ac9ec2caa5b

  • SSDEEP

    1536:gd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHF:AdseIOMEZEyFjEOFqTiQmQDHIbHF

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
    "C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    544831c578b4780d95ba804000b0f67d

    SHA1

    333ab43ae921baf46763ad5de733e6551e7949ba

    SHA256

    2d94dac9e53702b513c338196f3c56a5c49978a6c3b2a863591d4310447b84ce

    SHA512

    96d9c7fac6f9c3122c98f9798adb74cc7a5730696262e368bd4583f1e8548ebf3e521b76ad94ff3fab433bdd080fcf91efbf055eaa175d76af419cd4d5273434

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    117651c1724e0e3d8db39b45d546c5e6

    SHA1

    e92774fe36b70d6811ed27932ef7f28568373d07

    SHA256

    52512c0bfae13671d0dd72eaa6847f8fa52430ff74f584c45860e6a419883e99

    SHA512

    6128fc031bfa09ab32029f002b34854c68d0a57dbf70f6f889ff3a8f9626efb85588e8661169a2e3187c4a32ae88be5785a088b69827b41bf276eb7de6a28bf3

  • memory/2688-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2688-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2688-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2908-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2908-14-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4304-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4304-5-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB