Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 22:46

General

  • Target

    503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe

  • Size

    61KB

  • MD5

    5b59fdfc3f93c3b1fd2be24f2632d44a

  • SHA1

    54af018f546775e794ae404397ecd91b8e840d73

  • SHA256

    503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f

  • SHA512

    d9af13bd153563ea0281d549cc2b63445d2d0fa20054b2ce8680ec861702a6ca5fda8c8a6424f907005871c295875a947df0ee0767a0e2744b542e35f2573eb1

  • SSDEEP

    1536:kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZil/5n:cdseIOMEZEyFjEOFqTiQmcl/5n

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe
    "C:\Users\Admin\AppData\Local\Temp\503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5088
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    79fbc75d3e0f47de4e931507d785239a

    SHA1

    b1906edea646581e8b358032e63c1eb54a541ad6

    SHA256

    3601ebb8493127d06845909d76443ee10e5c5aedfbb6792b1d6a7c74ea553626

    SHA512

    cf2a9a2cc7264632717f3d220841561a7ba36aea73cf49c12651b418da96174333be534e6f6008a9b2786b1cf22e2530ba4795ddce6573808054b01afae6f1f9

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    7713f1899de3e4305d00795506b0b033

    SHA1

    ff9d2ba4fc6afe3200dcd6d5b7572bee16de8b49

    SHA256

    985036d325c077910c1e1d6681eb813936e04b6f465f11686ace0b18baaf3ce2

    SHA512

    b713ba4b098774b751a093198ac3a2c402748314f8b02ca3566b87081b3ac71f5e9ea5fabba70dd8e1adfbc5e49011ae28eea4138edf5b497ec1c1ae51c53996

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    dc282de4971cccc2e9dc6053476c62f8

    SHA1

    ae0b3b5c8a006d929bf802ad4ede8233d57ee5b3

    SHA256

    4aaae93f4a548cd632e3a874966f26423c01aae260b9a3c835ea850a424f4b11

    SHA512

    a6e061c57d6952a6fd47312b36b7fd863e7dd787dee79c3ef8fab34107cd8b1b4a768c839dddfe977279c0c4b4dcc27f216b43d4364073accefcf4b9e4cbe208