Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 02:50

General

  • Target

    b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe

  • Size

    96KB

  • MD5

    31e55980ad69426261b8860429ee0c21

  • SHA1

    4080b76d20fd5ab5cea415c344d98db4fa0731ef

  • SHA256

    b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800

  • SHA512

    8367438a0443204df982b1930f847de29cf233c0562030d8bb25201e70c01e10fd9abdccee88c307eb90a69bb912fd341e716a0b5c582814d81dd27ba8255c27

  • SSDEEP

    1536:LnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:LGs8cd8eXlYairZYqMddH13q

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe
    "C:\Users\Admin\AppData\Local\Temp\b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe
      C:\Users\Admin\AppData\Local\Temp\b2f9a02219b4b162c31705db3ec8bb79388aca4082eaac8b43ee3118b31ce800.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1472
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3692
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4132
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3924
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2480
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:736
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 268
                  8⤵
                  • Program crash
                  PID:4328
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 292
              6⤵
              • Program crash
              PID:1360
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 296
          4⤵
          • Program crash
          PID:3308
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 300
      2⤵
      • Program crash
      PID:4176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2068 -ip 2068
    1⤵
      PID:1884
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1472 -ip 1472
      1⤵
        PID:2016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4132 -ip 4132
        1⤵
          PID:4712
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2480 -ip 2480
          1⤵
            PID:3284

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            a12fb481a3f0c88b513ee8b0d641eb32

            SHA1

            70fe3fd22895b1fc06ae424960c06e4e56b61a69

            SHA256

            dde796b9c80a4c3b8b52a7be1ef601d457315d97c5d570fb487e00dce035a307

            SHA512

            a01f97e74616e603822e25c2ccd6f278722d4e8429d4e53fbf11d8af3e3998ea1ae8d8a5af266c550a1a50ec3bf72f270cb5bc994c6caa006e663627fb9d7943

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            b24981b44a7ce916ee50d664700b36fb

            SHA1

            8021be721a8e81cc93dd12b1daf5aaf2981f81ae

            SHA256

            5898e3aa8f9867dab01d71e51a55dc2e70de41569f9a451b14090b67448cd957

            SHA512

            6bf7809a09d4ea8c74d9ef6cb8b4eb6aa82dd239824a593c5a4d10608076bc6c1cdf0bf9a4043da6d23b73e3657a811fb6255ee109587ef4a8f7e81fce9f5a2b

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            e08f09b767a326b345096228f52bf1ee

            SHA1

            833382959c9321714d1da49c9b94e2abe80682db

            SHA256

            def0a7b9ee904a4297633bcaff8344891c458426d16741f5b875067b0425d03d

            SHA512

            78f1996b030a76a67b8decaed3352d2a2bb9dda7a12d4bc75926da00bfcbf2321460b116cad759fcde3b2a608bf1aee3c654c227ef68833223128ce5bd78bfac

          • memory/736-57-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/736-54-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/736-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/736-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1472-7-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1472-19-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2068-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2068-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2480-45-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2480-53-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3692-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3692-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3692-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3692-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3692-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3692-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3692-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3920-10-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3920-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3920-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3920-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3924-42-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3924-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3924-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4132-33-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4132-52-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB