Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 07:41

General

  • Target

    b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe

  • Size

    71KB

  • MD5

    6d3c3df79012ec40a3ba1614656c0099

  • SHA1

    0b55f5ceec915b607b1affdd2e95ceee903a4ff9

  • SHA256

    b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92

  • SHA512

    0e8e040f70d984097b83907da7e46c428b7910034ae529d365d6cd5490ac908015737a0c38e9ef426a38d2b2dd25b70ccd041c5014bd7dc137404ac9ec2caa5b

  • SSDEEP

    1536:gd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHF:AdseIOMEZEyFjEOFqTiQmQDHIbHF

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
    "C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3984
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    e55cfd909c91bdb7ebad8327b2f104d3

    SHA1

    fa02b52e841533ca360eb2e6b5db450b1bb476f8

    SHA256

    8ee9a15b11674c1e3b48235417b942d64e5539f322b64b6a87ebb17b7825a102

    SHA512

    48d8bd29b2202d29c768624641e6a2c32974d40c4301987b6b1ad782f866d695af9d5cc1025eaf1cd4c2d3978c43e29e794dd21a1a81bb488b1591db9c2fd7c4

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    544831c578b4780d95ba804000b0f67d

    SHA1

    333ab43ae921baf46763ad5de733e6551e7949ba

    SHA256

    2d94dac9e53702b513c338196f3c56a5c49978a6c3b2a863591d4310447b84ce

    SHA512

    96d9c7fac6f9c3122c98f9798adb74cc7a5730696262e368bd4583f1e8548ebf3e521b76ad94ff3fab433bdd080fcf91efbf055eaa175d76af419cd4d5273434

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    d3eee7a2bc1c26a718ce7a934956f192

    SHA1

    99123f6b77bcd4e16479fc28fe7cbbd3df2e9b0a

    SHA256

    1e8c7d36b9ca58ad0f5423d707051d775500e14c98020dc6a0cd1a87089017b3

    SHA512

    395b32dcb63442e110e6c2c6ce486ec448d46999ee530558d03434eb77e2291f05394c367212cb8a87f4db0613ec52af98031e59d5de46de1db7e2c6343c0c30

  • memory/1144-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1144-5-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1880-17-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1880-20-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3984-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3984-18-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4280-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4280-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4280-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB