Analysis

  • max time kernel
    114s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 16:29

General

  • Target

    2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe

  • Size

    62KB

  • MD5

    13058928627ee64bcf607d67cb75f148

  • SHA1

    8355da69de99e0c9716981fba0826f4cd0b61803

  • SHA256

    2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377

  • SHA512

    af3d91fdbc5244fd8cc5c9386de32236bfd56ed2be312de8cbfdc3a0eb2762525c9542108b202583604fc9bf706c8114f10719e8aebc763c30eeedfb9f4037c1

  • SSDEEP

    768:oMEIvFGvZEr8LFK0ic46N47eSdYAHwmZQp6JXXlaa5uAF:obIvYvZEyFKF6N4yS+AQmZtl/5N

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe
    "C:\Users\Admin\AppData\Local\Temp\2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2156
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    62KB

    MD5

    4d806911ce56b7bcdff20ce18b65da04

    SHA1

    e6020328055fa12e13511efcd08736cfddb23032

    SHA256

    705c44302f74daba504611d347fabfe9e6718b7946e5996cb7c0677241a2208c

    SHA512

    89ccc997248a1f1008a67b5d1d33fd72b95247795139aa3cc73b90114c8dc12539a0e61b7e84443bbca35f35d2ed7e429509e938bbdda8b283014d06485f681d

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    62KB

    MD5

    d6ed78621e78bc722a52a29907aff122

    SHA1

    a49c840ba3fb54bd5403f9e5e440f67e34ebd2af

    SHA256

    698a3c621ced5b6722fc8fad5083e78e52dc2bd08072f4cdadc6d19ef34ffd92

    SHA512

    e773a9870fa0e7c6f39fd62b23c9d9d2d1c3254182f8bdb8330858fafacd930b00dfe6e624691700fd6f52e257de2ea56a70f55bca6a068dedc027003e61ffa8

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    62KB

    MD5

    276478e5b16f941ed2ae5cc8b44cb8db

    SHA1

    0474e3924206a173e35e71b81fae675876cf873d

    SHA256

    ba8c9ac53a1b7fdf6ae1dd656ad4d48578a4e03de74dc3ea4b42625f70aec575

    SHA512

    559b291c066d2c6d2d4352e3a1a273c6657df5e9acc950342568649b3983a73ee47c2bc610d3fc45ebc80ca1c662220fa01955e3271446b68a56582c88afccc2