Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 18:38

General

  • Target

    1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe

  • Size

    62KB

  • MD5

    3dcdb2d1d4ba8dfb3a9d6fe0b1b20e75

  • SHA1

    bd322d374d7ec59ce7994fefb808ab42e51ea521

  • SHA256

    1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9

  • SHA512

    5130d0939b8336d13173c97dd6720cc61d27d24ec5afc73fcb274c180843534052e09d30e4672753f8a8687fbde935ced8f6a961103bc4b6dd32c357aa673f93

  • SSDEEP

    768:sMEIvFGvZEr8LFK0ic46N47eSdYAHwmZQp6JXXlaa5uA9:sbIvYvZEyFKF6N4yS+AQmZtl/5l

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe
    "C:\Users\Admin\AppData\Local\Temp\1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    62KB

    MD5

    4b9c29f26ead3b6be3c2066dc511476d

    SHA1

    a1cee8ddfaeeb934bc2c2ce6c2a268ca5254955b

    SHA256

    02716db5021493b91fc436ae05ec3cbbba7586b646bcb6fc1b653b39efcaa7f8

    SHA512

    0d2aa4950d09450ffaff88edbba451e41dd177205ffdca787bd5197fa47db2cd5706dc2901526642bd3cdc9ac99d5c60abf6bea0e5a583da91bbbdf88513002c

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    62KB

    MD5

    325e814de1e57ea2a120db75cb05790e

    SHA1

    7819d2069f6442ab78c04ee3f462320545588086

    SHA256

    acf7ca34ac474490b2467c3c24118785ffde6f72a150a5c23cd54bcb880925f8

    SHA512

    11dfa9359bf08a206e20e6274b485af4f846a8893c127fe2a2a3779021ff7373649562af53ec30dd2b124bc52c205840736520cb6b5378b2309d14e24a930735

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    62KB

    MD5

    5abae3f59312361035f71cd49484e7a2

    SHA1

    f07db8c52e6045d99d119499d9ff39e7fcf068e5

    SHA256

    51c58f2c1e3900d6517ba2f47ed70125c70bff9870f74c8d8b01fbdc509ae071

    SHA512

    940def11a3fef8a31287e590d2eeb7ed52bf5c06533a8918e16150e9435602b004e13137bc02e2aca3729adf7716a297dfddbd2cd6c1de7cffc96be8d4f94e66