Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 07:58

General

  • Target

    db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe

  • Size

    61KB

  • MD5

    d376f8fb586d399cbc7fbcea97191c40

  • SHA1

    54d2dc2fd119b41138f1c458312bcc73a4965bd7

  • SHA256

    db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3

  • SHA512

    fab8a20ab385249b6102cd3b009bfdaf44753374e7959e292ab237229f1575b3b6f086bf2e1d12030e3ec4f70f564cd47fa5ca478c9674546943b89c534e6f34

  • SSDEEP

    1536:Md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZil/5:0dseIOMEZEyFjEOFqTiQmcl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe
    "C:\Users\Admin\AppData\Local\Temp\db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    43fc0258dc27d2060ff6ae68a7e4c288

    SHA1

    0552ee7c63602c18d708da07b6f6f18f5f4be62a

    SHA256

    fc0e1d8129229c8456ca973085b39492253f3379d7a59d831fc3ad83de51df54

    SHA512

    c0c2e42452a667dc4e0231797e3593b17ce99f5bb9d7817af460c18788883756d50d2d971b9387d2013d37e32f753f19763afb25f2f95f2886cf89b311a9ab26

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    6a44811cacdbf8e5c827be0f6f58067f

    SHA1

    daa91549d738dde486139c0a56d8e4f81985d4ef

    SHA256

    61c299934dddc78922e08cb73936c02f7c243641b6715c485a90014d84ab52c7

    SHA512

    1651900ba706d8e4bc04121922ec113c2bb6b02141df70965f1ed284c85547711d5f3e308316e0691c731e444e8afd397ac2841dd90e3e6387e2327acea43d44