Analysis

  • max time kernel
    114s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 12:58

General

  • Target

    52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe

  • Size

    33KB

  • MD5

    8eef2c3025fb9974e0f0b42b6a5c570e

  • SHA1

    34ac41720ca5aedb54c119795c713dd5deab0443

  • SHA256

    52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba

  • SHA512

    d9eccd1da5b4be77e1dcb3a4e61631004d9278a63688e67c15163bc89982fb76e090f4cda7390995c82eaa0dcf01435240a9f0c7071f658d64dcc11542a94fc7

  • SSDEEP

    768:efVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DF:efVRztyHo8QNHTk0qE5fslvN/956qo

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe
    "C:\Users\Admin\AppData\Local\Temp\52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    33KB

    MD5

    6cd1763b94ef41dbca7e275fc3f46bd9

    SHA1

    bfdebfcece3d4662bacaa4d82f8028f3b73cc87b

    SHA256

    1cc47a53ffdcd8864c0af30e800408124a2c6ee7c059ca8f9303ad28b4bb09b0

    SHA512

    af3b1625c5c82a7a205405b93a1ece4fffa4a6691cbc76f6e4a4ab66af1b2273b2283f659433e699bf9385933174155f7dc4e3dd7993854c733ee438396cdb2e

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    33KB

    MD5

    71ac9dbff004f940f6a07c2882c5f161

    SHA1

    afe267e415c2c7b241949b60e3dd194fbeb53222

    SHA256

    1969aaebe8fbd0b7c0eec13a1ffd9bb512c7e2e3c38fbdbe1a27c9ac27db7fba

    SHA512

    9aeb4f9b4caa506d7ba0d469b1a9b7d10582f837d4ae35e2d1a58347fd1ce8256035981f742eb1529ddb22ccff9a57c31627fab156721de6e1284e0ab734e94c

  • memory/1472-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1472-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2936-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4852-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4852-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB