Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 22:46

General

  • Target

    503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe

  • Size

    61KB

  • MD5

    5b59fdfc3f93c3b1fd2be24f2632d44a

  • SHA1

    54af018f546775e794ae404397ecd91b8e840d73

  • SHA256

    503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f

  • SHA512

    d9af13bd153563ea0281d549cc2b63445d2d0fa20054b2ce8680ec861702a6ca5fda8c8a6424f907005871c295875a947df0ee0767a0e2744b542e35f2573eb1

  • SSDEEP

    1536:kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZil/5n:cdseIOMEZEyFjEOFqTiQmcl/5n

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe
    "C:\Users\Admin\AppData\Local\Temp\503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    7713f1899de3e4305d00795506b0b033

    SHA1

    ff9d2ba4fc6afe3200dcd6d5b7572bee16de8b49

    SHA256

    985036d325c077910c1e1d6681eb813936e04b6f465f11686ace0b18baaf3ce2

    SHA512

    b713ba4b098774b751a093198ac3a2c402748314f8b02ca3566b87081b3ac71f5e9ea5fabba70dd8e1adfbc5e49011ae28eea4138edf5b497ec1c1ae51c53996

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    c4bc739cb17bfe756a9bad133d509db6

    SHA1

    15199376728e593a69e39b547291ab8447021520

    SHA256

    e27bb9fe14b2bd27c9b7174da99add52be89a6bd5a47fc748b977aa9edfc4b3c

    SHA512

    9548b20f2e08412084b00852f9279e936e4a41456d2880efaec07a49ca6fbadc1de9362e13cdb007c9d69c057a6d0e7af49d8818ebd1b7a9e0f426a2d86beea2

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    7777a654c0c90ec6bde2c92cb5184c72

    SHA1

    743c8b87e94419527f118fa55b21a076a6e39838

    SHA256

    c22c1507c0bf7d8005860df9b97135ad5899eca7d3a7e02e8f3fc67d24bf4485

    SHA512

    7dc5739c18c99f782a4c6c42c01a81c2b9419ad845102a7e6c28c51ccc368a856ec89034be58cf382f11059df2778d09c07fedd8c01349682aafb0bc098d56f3