Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 22:02

General

  • Target

    4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe

  • Size

    90KB

  • MD5

    ed576037d42534c801be3e1bf101eaa6

  • SHA1

    a14c6e7c04a49a1fb4bbeace71fe5604990c8540

  • SHA256

    4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e

  • SHA512

    45d2624e50ba4606899feb6261ab87471e6b8c93ca1a4bc4c0ce223e77fdeeb6cbf53f7c195dd022de8a9976e4e13e1b4100c2053c58f8f4be2dc61a0a8c062b

  • SSDEEP

    768:sMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:sbIvYvZEyFKF6N4aS5AQmZTl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe
    "C:\Users\Admin\AppData\Local\Temp\4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    40774d67199bc0af539159785171ea47

    SHA1

    c50cb7dd81c9b57e0026914fe0cdce9cbbff6012

    SHA256

    7d1303035edaa270937d8d4f630a04013d66c162d02cb41c1ec9b4c9e64ddeea

    SHA512

    c3c687582aa4aeb5fdf95a14df88d34372fa6324c939328dab48b57889dc4e7a7e3c6aa1ec032aa2727adcec4222950eab469a7750bc2b443e15646768469ecc

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    d13af31a54e40aafd4b97d542c9f32b5

    SHA1

    230831bd42246bfdea18b485957b08f0af214a57

    SHA256

    8107d244bb927d303d998db78de06bd0ed2b73a6040a7441af1818c9ae116eca

    SHA512

    160035cd5228997d9c3a91f082c590553eeba8f9197f56abe02e819d00733c42f61fb686df0061a919c65e4c0df94552a1b1a3a5cb74e6ad837e4d2eae1d3ae7

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    90KB

    MD5

    441f3528716194866b220b7f24622767

    SHA1

    7e71ddb155b8d1879e21b09ebc06cdc73c24e14d

    SHA256

    fb1b11c5bd60ddba419e6acbda6f56eafc0a19c487112938e1456cfe824fa674

    SHA512

    6adb1b920102cfe92bf8b44f2d9d57f57739ec71af0bd7ac1813786e5cc8fbebe094f7cebcb669519468095cb745777ff5d0b4b75977dd0fc5567a61b8603109

  • memory/1932-36-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1932-31-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/1932-26-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2248-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2248-18-0x0000000000280000-0x00000000002AB000-memory.dmp

    Filesize

    172KB

  • memory/2248-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2248-24-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2752-39-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2844-8-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2844-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2844-9-0x00000000002A0000-0x00000000002CB000-memory.dmp

    Filesize

    172KB