Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 07:58

General

  • Target

    db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe

  • Size

    61KB

  • MD5

    d376f8fb586d399cbc7fbcea97191c40

  • SHA1

    54d2dc2fd119b41138f1c458312bcc73a4965bd7

  • SHA256

    db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3

  • SHA512

    fab8a20ab385249b6102cd3b009bfdaf44753374e7959e292ab237229f1575b3b6f086bf2e1d12030e3ec4f70f564cd47fa5ca478c9674546943b89c534e6f34

  • SSDEEP

    1536:Md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZil/5:0dseIOMEZEyFjEOFqTiQmcl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe
    "C:\Users\Admin\AppData\Local\Temp\db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:672
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    43a16307e3106ad4a63ad0fe6946cb00

    SHA1

    d21258948d93b227fe71f6f23127fe7899383cf8

    SHA256

    643fd3f7ec27be66a70234ae01c202f12b69b01bf0454803e7c6a536b47c5982

    SHA512

    764f93cbb568ae0c1cce65486753c0e4f37a3d264eb81469502ab4101f42db6e33cc89738f00066a7827df8790073f5f9ba7307f058e28ea03903c2f7a18bd63

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    43fc0258dc27d2060ff6ae68a7e4c288

    SHA1

    0552ee7c63602c18d708da07b6f6f18f5f4be62a

    SHA256

    fc0e1d8129229c8456ca973085b39492253f3379d7a59d831fc3ad83de51df54

    SHA512

    c0c2e42452a667dc4e0231797e3593b17ce99f5bb9d7817af460c18788883756d50d2d971b9387d2013d37e32f753f19763afb25f2f95f2886cf89b311a9ab26

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    c7e260a81b6b71adfa9ec81efcbc586f

    SHA1

    4ccee1b9fa293f5beb3cc776d9da76dc320b2c5f

    SHA256

    d5181d23ee34298b13dc2cadaa067e8cf39f94fa9c725c84f7794556f5866a8c

    SHA512

    d3970fe07032db8076ad7abfb1fd64f5ca0ef3013a94eb292489bdcc68521a6f74d71d9731be28312da794a31b1640ef51b814704d2e8bad9a273c1a487b61b2