Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 01:57

General

  • Target

    7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe

  • Size

    76KB

  • MD5

    56080554397ca8fb2f5a16c333bfeb76

  • SHA1

    9864307dfc7a84e8a6d45dc742f2cd6415bbb34d

  • SHA256

    7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a

  • SHA512

    27189da3101a4b1ee18a0609c713b159e0b558d2229603ac23eea698f89cd77369b67c20003a5edf1680cfecb64388c24b74657c3c4d36af3a80cfdf628782cd

  • SSDEEP

    1536:ed9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11L:GdseIOMEZEyFjEOFqaiQm5l/5w11L

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe
    "C:\Users\Admin\AppData\Local\Temp\7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    deceb37af32a28fe04e1bf078e291318

    SHA1

    e90d0b18ff525b25d1dc762183437811fdb71432

    SHA256

    db2518a0afd1ce1ac8a7f28a8bc9464c8f319f8205ed1f36846ea1c97422ac5f

    SHA512

    c00899b183bfc9f16e2024861786ca73b78336f37d4088ca63c7b0f57e934b6703898b636656ecfc3b0ce4c85adc73298b34deb325c4ec11b24b6bc06ed08bf5

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    a6e7dcd449a78d72236b8c72104b530d

    SHA1

    0cbc1fd90412c90a9fe77116804ec5327611dc59

    SHA256

    4c1460a431bb583d6ff77e8beb170f55a1263bf627275c4a74fe2921a071e1ee

    SHA512

    f303449961ec615b6350e8bc826f57e6c652bef113cbb9c2ac127d163316fdd7bdae4de72f1728c4863598fc1b1ce345a67437dc66e2317f8065b3a6f934cf17

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    7f021d8bdc05da5680baf3ebdba5087a

    SHA1

    f2bad84369333bcf2f977e5210571e4ad5a42a0c

    SHA256

    09931fad4a6722231cb60f27aec9d20814cad0ee0a2cf29f31955263634226f2

    SHA512

    9085dc1c699de020eaa2c60a074b1db380602e212ea1ffae81c9644055556a8346740c5c9d78513ac0c3e4a0b6097b963b176c126fc90842597e7a9c13ac1649

  • memory/2740-24-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2740-22-0x00000000003C0000-0x00000000003EA000-memory.dmp

    Filesize

    168KB

  • memory/2740-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2740-23-0x00000000003C0000-0x00000000003EA000-memory.dmp

    Filesize

    168KB

  • memory/2840-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2840-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2840-4-0x0000000000230000-0x000000000025A000-memory.dmp

    Filesize

    168KB

  • memory/3028-39-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3032-26-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3032-30-0x00000000002B0000-0x00000000002DA000-memory.dmp

    Filesize

    168KB

  • memory/3032-37-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB