Analysis

  • max time kernel
    115s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 06:18

General

  • Target

    c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe

  • Size

    96KB

  • MD5

    88a830fdf0f96f8643fc290710c0a580

  • SHA1

    68fa6d58b5f014a8061456736413a7cc933805b4

  • SHA256

    c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1

  • SHA512

    7b756edc66fcdf047b49744b3d02bbc988d30c570fa075cbac0be04a157947e5d8c4f6aa6f6b8a08d4daa39a4b5f33b81f9e05adc00bfbd73451ceb53ec33e2c

  • SSDEEP

    1536:JnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:JGs8cd8eXlYairZYqMddH13z

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe
      C:\Users\Admin\AppData\Local\Temp\c82485549b0da04a1f6001b982166dee43b265038b56bb02f6cbd7a5972359f1N.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4948
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2072
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4800
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4296
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:5092
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 256
                  8⤵
                  • Program crash
                  PID:1728
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 292
              6⤵
              • Program crash
              PID:3844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 288
          4⤵
          • Program crash
          PID:4496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 292
      2⤵
      • Program crash
      PID:3120
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1660 -ip 1660
    1⤵
      PID:1624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2260 -ip 2260
      1⤵
        PID:1992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2072 -ip 2072
        1⤵
          PID:1120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4296 -ip 4296
          1⤵
            PID:3644

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            00cc1309e57517997012a8ac4c3ff254

            SHA1

            66539c0f33dff7e76aa2667de49906ecb1dc033b

            SHA256

            dae0d6cae4010106e1d59f138b51d322e18f5e6af97c18e9af775dec3e7d5dae

            SHA512

            bfca9fca7465663213013a04af685997a4119c6d6ef9c48c765f5e069d90fe3917e34b7083ceb99b89fa8728e29782d711d948f166a0ec37d1343412fd5fed02

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            79c6288b99bfde226ea4f9ba645f6d08

            SHA1

            fd7ce5ce79dd1c8662d583eb700acab3e49061fc

            SHA256

            da1223ebe8ae371ba4444710cfabb99cc5a0a24d5b9d55d54b2d67acedacda26

            SHA512

            26a949bcb8b033cc11c9fc21fae34306a67d4f9134cb714dde71eb25a319ca166a0fcbdf1cd728b75166a6f5b4f5a2a58687e4e8355a9b5df59b1247781b089c

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            437bd333267c2ebb317883e3af7d4f34

            SHA1

            3012f4e0f91bdb4e57e0ae1f49c967d6e15e987a

            SHA256

            5380af48baff9723cd23f44ea2cd15fa36cc56c6948ae579b78bacbdae9517bb

            SHA512

            51b741ccc041bb8297b2b66f824f75774d56cdc041241a3e4954d17299ab3916d8cd9827ed0d4e4b2565e42a552849a8b5b77b264d63b52c67b9d9dd1693a595

          • memory/1660-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1660-19-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2072-35-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2072-53-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2260-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2260-8-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4296-46-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4296-55-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4800-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4800-41-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4800-39-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4948-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4948-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4948-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4948-34-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4948-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4948-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4948-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/5092-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/5092-51-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/5092-56-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/5100-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/5100-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/5100-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/5100-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB