Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 09:13

General

  • Target

    b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe

  • Size

    76KB

  • MD5

    54671b1978545adcabcd1af11ee404fc

  • SHA1

    509ad6c0bcaae5b039072de1901573ebdb593afd

  • SHA256

    b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4

  • SHA512

    dec6d7c69fc5edad231c81f3a94cef5fc36725ddf0ae6d2b40500aab6d9ffa377bec85b72520303b378818c4b34586a22c4db8586e47d1231fbcffde4fbaf780

  • SSDEEP

    768:KMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWr:KbIvYvZEyFKF6N4yS+AQmZTl/5Or

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe
    "C:\Users\Admin\AppData\Local\Temp\b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4284
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    84be90bdf56204c00770e860298186ba

    SHA1

    2f494485d6ebdb53bb492c478d5343b43145dbf5

    SHA256

    c6f20c8cf773cd2e2441d2269c1e5c4f22d10c41adc15a9f942c35093f162130

    SHA512

    27e781bd3e7710ca4e45498100b3bfbecc9260870e092bb08fe0a16502ab119e02182ef4da64bc4e58b8c263ca38f0b3f050f7621edb258533705022d780fc50

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    fb69375e151864010137492993111414

    SHA1

    e739d54c8bfc82648c733e804b911d2a75a0b311

    SHA256

    4240db1f62eae917fa92609a65faa918436e66f946128817e63831a8c586bfd8

    SHA512

    79cb437a7016f7b9ba905ab1355c419fd5fe0f7faec85ae8e2518bc3b6927a2a4158e242978173be82cb45e24c2ab2eeac38e850811e90920a848609b7ca5e34

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    90cc93139ef12cdb838c713c78708386

    SHA1

    ad1ed499397e8f1da7163fd92ee897d781fa0f7b

    SHA256

    014a6339c5cd4643501e5d1bfac011cbcd4c3d872a045b0f756430c955ecb7c6

    SHA512

    26cb199e0ebc6a16d26481d0afa6bbe3f62e72c451e156a3c4fdb79d7dde38e941b7fe4b8be0ed7de0ea7649146270f34ae7046afe9c84ef717eb034d897856e