Analysis

  • max time kernel
    114s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 01:20

General

  • Target

    5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe

  • Size

    90KB

  • MD5

    62b3a09a071a8088a4126ecd348254f7

  • SHA1

    e9f4a00b33b5e6b91299082d464334decda79944

  • SHA256

    5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad

  • SHA512

    2a09f39732224747721438bf4d5e2036aeb85e4133d7db643dcbc360c6ca65b6c117e102f26c3412f6f5e7127d8a56a0c183b5719dd06825fe58833b2f37e2cc

  • SSDEEP

    768:2MEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAO:2bIvYvZEyFKF6N4aS5AQmZTl/5G

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe
    "C:\Users\Admin\AppData\Local\Temp\5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    65efd2902d60f12317de93e5bc024f67

    SHA1

    b2a72487c3c546f9449a12012fca91b99e6f7898

    SHA256

    539a55dcfc85a0914867622ca7b6ee79338d0a1105ae1d7267d8a345de21acef

    SHA512

    a3797f4175cc295d6aee0f3579a292824613c86d69f9eacaff7fc49581802d19a89c2597d92c619f3b7cc50f06e7bca0da740525f65e5956c73795bf50b5a6b1

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    c8e99543794cb8b16b2c7a8f8c93e5b0

    SHA1

    7edf14b7178e2da719ea797b1ba39b5d0d5559b3

    SHA256

    a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73d

    SHA512

    edac828172fd9f58058ac40f199a6ff200bb785a29231fe25b0ab45eb7bfabe6f9d00fbec82ec97e433ecb1a8a7031099063b7e142f9a1e5e913d5bf75fc9e72

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    90KB

    MD5

    cb01b42f5cf58dbbe625f2579392ad02

    SHA1

    319d6651f423fdc321ed62124bfe083c7a77245b

    SHA256

    8b1ea586ef259551c88239a1795bcaa848f2a4cf859fa5e1bf08cfb4d6d28139

    SHA512

    7a416ec70dca765778aed3fbf6c0b987fcf7d79403535af6fad4a3f141199d36724b5f2ab19970d4b8e8ff34fa2bc1dcb79404a604fc39122eab4865e315461e

  • memory/684-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/684-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1460-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1460-17-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2400-19-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2400-20-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2456-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2456-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2456-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB