Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 22:02

General

  • Target

    4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe

  • Size

    90KB

  • MD5

    ed576037d42534c801be3e1bf101eaa6

  • SHA1

    a14c6e7c04a49a1fb4bbeace71fe5604990c8540

  • SHA256

    4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e

  • SHA512

    45d2624e50ba4606899feb6261ab87471e6b8c93ca1a4bc4c0ce223e77fdeeb6cbf53f7c195dd022de8a9976e4e13e1b4100c2053c58f8f4be2dc61a0a8c062b

  • SSDEEP

    768:sMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:sbIvYvZEyFKF6N4aS5AQmZTl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe
    "C:\Users\Admin\AppData\Local\Temp\4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    40774d67199bc0af539159785171ea47

    SHA1

    c50cb7dd81c9b57e0026914fe0cdce9cbbff6012

    SHA256

    7d1303035edaa270937d8d4f630a04013d66c162d02cb41c1ec9b4c9e64ddeea

    SHA512

    c3c687582aa4aeb5fdf95a14df88d34372fa6324c939328dab48b57889dc4e7a7e3c6aa1ec032aa2727adcec4222950eab469a7750bc2b443e15646768469ecc

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    90KB

    MD5

    325585d193bacd643b27512f25a62fa4

    SHA1

    8dbe4c81b67c007de4282101f24ae7086a4fecfa

    SHA256

    e3c3512c73739a131501d5cd341cee66a515962e98640b9b879c2e361e55722e

    SHA512

    e04acfa79aa8a5e0d4a0372fcf252168cd6edbda78a3e7334871335b832e1b257ec7f513e998fa583f56248bd19ba8a6d79a96be01325085f07256a2c4221cd4

  • memory/1600-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1600-14-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4260-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4260-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4576-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4576-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4576-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB