Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 04:25

General

  • Target

    ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe

  • Size

    96KB

  • MD5

    f8a08329c22573430f4c245f838c66a9

  • SHA1

    bae4f0a052a2d0faf497a64949b6ee8fb32d6261

  • SHA256

    ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c

  • SHA512

    ef84286ac76a894c11b1cd6b7bb88ba0d209eb95653ede138be8a1a69f9e442135800680dc63c7690ac2c099bf52f5911687db106e56090605199679c81692ac

  • SSDEEP

    1536:9nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:9Gs8cd8eXlYairZYqMddH13B

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe
    "C:\Users\Admin\AppData\Local\Temp\ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Users\Admin\AppData\Local\Temp\ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe
      C:\Users\Admin\AppData\Local\Temp\ef4fa9b004946c519d1df02891808e66f59904036364f3fd8b271d9e072daa7c.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3600
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1924
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4524
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4684
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3572
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 252
                  8⤵
                  • Program crash
                  PID:3980
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 292
              6⤵
              • Program crash
              PID:1708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 300
          4⤵
          • Program crash
          PID:3452
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 288
      2⤵
      • Program crash
      PID:1800
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4216 -ip 4216
    1⤵
      PID:3700
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3600 -ip 3600
      1⤵
        PID:3092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1924 -ip 1924
        1⤵
          PID:3136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4684 -ip 4684
          1⤵
            PID:1384

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            8fb7b806fff402baeaaa4d7b6f921d2e

            SHA1

            01d401a410b98c409f371ec0a86ea9ecc0bff667

            SHA256

            dc5c4e76220a9503baa973918e0069e97d3fdb4e43bd94e95cb42be2a9b00743

            SHA512

            e9a3415b81569c67d404a8806f193ced9edb1ad46bf44e58de565c3f1d2d2e4c062218e6560210de084002ba9e1449f11bca9e79b938128a51594aa4f41b1e1e

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            967e0b4dcbfef0b1b6ebb793811cc2bb

            SHA1

            3e2c1162b334fb4000e3b9aff0c4feef02d25ea3

            SHA256

            c772a34d9bc5d96a11662dda1cb8438c89f74b357f597b52cc53cc900dbd664f

            SHA512

            9a61df8c620c444032f287d99a39db92445e3289a62175b1e1c9243b7f77497d34d595869e8b97598597317210546dd14503fd1f79793984288ac4963ea4cba0

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            a89e571cc5fc19846916300ee049cbd3

            SHA1

            48ccb4ca760e5004cb92d95c17f630ee5b022621

            SHA256

            dc199003dd5308a2ec580220744bc596a5433aa96eaed22b4b689a33bb47f8c2

            SHA512

            db8ff84dfae7c40fbb404a7a87f02ca5520d9222a9934e13a1d0fadb1dd2a607ba2a8a792f41f40a4e5beda94da4b5e501874876da2656ce084e96a78a80f32a

          • memory/1924-52-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1924-32-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2452-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2452-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2452-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2452-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2628-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2628-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2628-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2628-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2628-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2628-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2628-30-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3572-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3572-57-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3572-54-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3572-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3600-18-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3600-10-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4216-19-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4216-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4524-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4524-43-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4524-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4684-45-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB