Analysis

  • max time kernel
    115s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 02:15

General

  • Target

    51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe

  • Size

    76KB

  • MD5

    ac6aaaabc173bd895004e09a05dafd90

  • SHA1

    7c347e6d13b37e1f416e8770beb5da59a06c66fe

  • SHA256

    51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26

  • SHA512

    0efcda78a2ccecee99b1a2fc5033e1e0c69774b64ed222feb8b9003ee5b60b3e808764924a8be0d9fbee887001273ced6467199e696408ea7fc136b0ba3f7be6

  • SSDEEP

    768:fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAW:fbIvYvZEyFKF6N4yS+AQmZTl/5O

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe
    "C:\Users\Admin\AppData\Local\Temp\51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2232
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3280
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    24ef689911ac240db41c4d85369bad62

    SHA1

    6fe0eb12cf4d8c22c297c2cf8fcd6f8ecd0a321b

    SHA256

    d706ea1dc6097db4292c943f2be8ce2d2923ed432faafdcfa0527c51408176ea

    SHA512

    1e641b3ae3706a01011e010e7172486fd5105dd8601de965e634792c14f638beb3dec58f87419a4bec8733a628d6dbdf1920ea74871a727d94c79b63dd9bb46b

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    2ef2a73393a3289b040e98d1cc5efa71

    SHA1

    e65bbda415c1b48dbe17c26557fe4a3ac30fbb97

    SHA256

    31dbad8c7e2f0efb2bea039974105bc5ad3fe3a6e3eca5f94a3341a6bab9ec23

    SHA512

    b9e3ffbd945704730bdd0591b0ef1768964213e5adb9d0a548ec27ed06f1fd87519fe6161c98fe903b4d5a4131d4b4cc7be3cf5598260088c4610dca663e1207

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    76d4bacabcd7c2d268f2490bd578e080

    SHA1

    3c8de345947d3ae459a38e0adb95352eb5e968f1

    SHA256

    4a455350b2eeab050dc66f4b00897b0107e0170e598e8b118f2a566ae7fab4b1

    SHA512

    69ad91718195817899e1c8d688ac6649986a2aa01257c6cc31a622cae107503ce3db4402c782e44546b4c99b6abcceb5aa7fe524bb38ed7c3e2e1336dbf83d2e