Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 19:22

General

  • Target

    6ac570df977b5acbea1901eea5523e42f1216ea68786901c04a78e69111a09ebN.exe

  • Size

    96KB

  • MD5

    2b0d9b24b917d244b0ce5640b7596c80

  • SHA1

    f640aecf865601f6bcf491a1b0a41456c0d95108

  • SHA256

    6ac570df977b5acbea1901eea5523e42f1216ea68786901c04a78e69111a09eb

  • SHA512

    aeafef6fc8aeca78b9424611933b4e7b3fd945695c474f99bd02efbd24238b53343bf4e3d1fb47249b51584940f125041861e5a775fbf84ae3946eedf2ce1afb

  • SSDEEP

    1536:anAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:aGs8cd8eXlYairZYqMddH13L

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ac570df977b5acbea1901eea5523e42f1216ea68786901c04a78e69111a09ebN.exe
    "C:\Users\Admin\AppData\Local\Temp\6ac570df977b5acbea1901eea5523e42f1216ea68786901c04a78e69111a09ebN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\6ac570df977b5acbea1901eea5523e42f1216ea68786901c04a78e69111a09ebN.exe
      C:\Users\Admin\AppData\Local\Temp\6ac570df977b5acbea1901eea5523e42f1216ea68786901c04a78e69111a09ebN.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:436
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:428
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4192
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2496
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4700
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:452
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 256
                  8⤵
                  • Program crash
                  PID:4964
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 292
              6⤵
              • Program crash
              PID:4484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 300
          4⤵
          • Program crash
          PID:4848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 264
      2⤵
      • Program crash
      PID:3680
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1624 -ip 1624
    1⤵
      PID:2640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 436 -ip 436
      1⤵
        PID:3456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4192 -ip 4192
        1⤵
          PID:1104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4700 -ip 4700
          1⤵
            PID:3836

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            99586e7a6401b3f207f04d2562f758bf

            SHA1

            5689d610a27722ec4ea0910a43761ee09b75958b

            SHA256

            37b18957375d803dc862c48c3c7f4ee55a5725764c805aa94c1bca876ae4e41c

            SHA512

            1d70482802d629c9a103599a75cf114eace88a79e04783547c21c65e79b1960ab827cabbbd3b873ba6b30957f8a68c919ff3ee54cc43b93c6092a70e4e620ef8

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            f0b5c73d63c71c2c2c18162686fff6ac

            SHA1

            68500b978378a80b6fd5152453e3f82cdafa4045

            SHA256

            f5b1640f704d836859fb5cd9d3bad518b2db8f80ed636d10d23661407426e044

            SHA512

            1084e4de5da561450b632cba3dee3c66577fcab29e5d8d2ee166c454ff3876f537b1225045e2acd22ea33772fd2bb1860d896dcf8cbda52ccc12c895986c9674

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            ab3b3d30318a37941fad8c9bf3d1c5b2

            SHA1

            eda0b3418a4356571246b41dd6ee84a3f2f45a38

            SHA256

            f3e60e56fe9cf1d4447b983e93e85ba4dfe0f328938cdf3515f7a7dd9900a0e6

            SHA512

            54c9e2ab1653365e2d34819947d09d766d21b800a6f3d4c4b6ce7a4c975f0245a3915b81eadfec8d31713a2840db24e266196f6196d8e3b9661cb1ac2ae86a80

          • memory/428-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/428-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/428-34-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/428-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/428-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/428-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/428-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/436-18-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/436-11-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/452-55-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/452-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/452-51-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1624-19-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1624-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2496-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2496-39-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2496-44-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3736-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3736-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3736-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3736-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4192-35-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4192-53-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4700-45-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4700-54-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB