Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 13:43

General

  • Target

    be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe

  • Size

    33KB

  • MD5

    89cf0cba306fcc16afb21f84a5a9f7c0

  • SHA1

    4cf3747e5e2388305b5cf740cbc3fe3ddbe73c5c

  • SHA256

    be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66

  • SHA512

    b3744ce8c59d4db32192cc0904b22715b8ff6c4534b12a186dadecf41ffa2fcabea05b447f504d9b88d79cf19d7c19f47e21e353e3b00eb5fb3f8f6f5052ba92

  • SSDEEP

    768:FfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:FfVRztyHo8QNHTk0qE5fslvN/956qQ

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe
    "C:\Users\Admin\AppData\Local\Temp\be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:3312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    33KB

    MD5

    26ae0504bf448d1cb207017dfbc2a2cf

    SHA1

    57b0343cc107fe91f9116f0f52a8f02d594e8a9b

    SHA256

    74b5bdce8e12262caa948cc1a65653491056c4979e7f726f8747929d2819a7f4

    SHA512

    b606b0e2b4bbeeb7f78f48d68c20cf6b3e7de1c2741ab2aaf41fa3abbb543324bff12e721a92b07fa6c664a0007e7302ab59cc8adedd365a76cd91e666d5a678

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    33KB

    MD5

    1de0b6da53ecb5f95f92a72b7bcbc0b7

    SHA1

    9d99a77329e209a7ed04c877c69b1463d9d92db9

    SHA256

    9719dc1d7ee95f937900a10dc41cc8ea5a82081285b8552872dbf338d61e2423

    SHA512

    4d59039fb3e01bbd8bb524e5aa6cf8022fee18af87eeeaf1bc4e8e0c781801b784b1e639f33dfcd025ee7f6ceb2e0d87613010d69ce1b97b7ff85ce3b1e7f6f2

  • memory/1428-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1428-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3312-18-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3312-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4296-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4296-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4296-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4296-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4296-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4296-21-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB