Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21/12/2024, 06:44 UTC

General

  • Target

    f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe

  • Size

    64KB

  • MD5

    faa1f0708a24f1248f743e820a405109

  • SHA1

    a412e6fab7fb4dcdb7f5d8c2994649380056e7a0

  • SHA256

    f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a

  • SHA512

    261f2f1c3982146fbef8e58b7cc0bd507af25e70f40bc3cb382f8f161d3409d17d10ebb742dc7e5c1a95482273cf7843af92f11ac5c7c739254f1e2732d3d9e8

  • SSDEEP

    768:KMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uAN:KbIvYvZEyFKF6N4yS+AQmZcl/51

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe
    "C:\Users\Admin\AppData\Local\Temp\f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2660

Network

  • flag-us
    DNS
    lousta.net
    omsecor.exe
    Remote address:
    8.8.8.8:53
    Request
    lousta.net
    IN A
    Response
    lousta.net
    IN A
    193.166.255.171
  • flag-us
    DNS
    mkkuei4kdsz.com
    omsecor.exe
    Remote address:
    8.8.8.8:53
    Request
    mkkuei4kdsz.com
    IN A
    Response
    mkkuei4kdsz.com
    IN A
    15.197.204.56
    mkkuei4kdsz.com
    IN A
    3.33.243.145
  • flag-us
    GET
    http://mkkuei4kdsz.com/910/374.html
    omsecor.exe
    Remote address:
    15.197.204.56:80
    Request
    GET /910/374.html HTTP/1.1
    From: 133792370882402000
    Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6451aoe|A49415h7:f545egibhj18he<:d99a7ha9
    Host: mkkuei4kdsz.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    content-type: text/html
    date: Sat, 21 Dec 2024 06:45:53 GMT
    content-length: 114
  • flag-us
    DNS
    ow5dirasuek.com
    omsecor.exe
    Remote address:
    8.8.8.8:53
    Request
    ow5dirasuek.com
    IN A
    Response
    ow5dirasuek.com
    IN A
    52.34.198.229
  • flag-us
    GET
    http://ow5dirasuek.com/38/5.html
    omsecor.exe
    Remote address:
    52.34.198.229:80
    Request
    GET /38/5.html HTTP/1.1
    From: 133792370882402000
    Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6451aoe|A49415h7:f545egibhj18he<:d99a7ha9
    Host: ow5dirasuek.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Sat, 21 Dec 2024 06:46:03 GMT
    Content-Type: text/html
    Transfer-Encoding: chunked
    Connection: close
    Set-Cookie: btst=c7afecb73305c1918ed70c2e21efe4b1|181.215.176.83|1734763563|1734763563|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
    Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
  • flag-us
    GET
    http://mkkuei4kdsz.com/435/271.html
    omsecor.exe
    Remote address:
    15.197.204.56:80
    Request
    GET /435/271.html HTTP/1.1
    From: 133792370882402000
    Via: goqjiuq^uiv@;08bcrhe@9^serdq=4403435bovA6451aoe|A49415h7:f545egibhj18he<:d99a7ha9
    Host: mkkuei4kdsz.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    content-type: text/html
    date: Sat, 21 Dec 2024 06:47:16 GMT
    content-length: 114
  • 193.166.255.171:80
    lousta.net
    omsecor.exe
    152 B
    3
  • 193.166.255.171:80
    lousta.net
    omsecor.exe
    152 B
    3
  • 15.197.204.56:80
    http://mkkuei4kdsz.com/910/374.html
    http
    omsecor.exe
    473 B
    644 B
    6
    5

    HTTP Request

    GET http://mkkuei4kdsz.com/910/374.html

    HTTP Response

    200
  • 52.34.198.229:80
    http://ow5dirasuek.com/38/5.html
    http
    omsecor.exe
    418 B
    631 B
    5
    5

    HTTP Request

    GET http://ow5dirasuek.com/38/5.html

    HTTP Response

    200
  • 193.166.255.171:80
    lousta.net
    omsecor.exe
    152 B
    3
  • 193.166.255.171:80
    lousta.net
    omsecor.exe
    152 B
    3
  • 15.197.204.56:80
    http://mkkuei4kdsz.com/435/271.html
    http
    omsecor.exe
    381 B
    604 B
    4
    4

    HTTP Request

    GET http://mkkuei4kdsz.com/435/271.html

    HTTP Response

    200
  • 8.8.8.8:53
    lousta.net
    dns
    omsecor.exe
    56 B
    72 B
    1
    1

    DNS Request

    lousta.net

    DNS Response

    193.166.255.171

  • 8.8.8.8:53
    mkkuei4kdsz.com
    dns
    omsecor.exe
    61 B
    93 B
    1
    1

    DNS Request

    mkkuei4kdsz.com

    DNS Response

    15.197.204.56
    3.33.243.145

  • 8.8.8.8:53
    ow5dirasuek.com
    dns
    omsecor.exe
    61 B
    77 B
    1
    1

    DNS Request

    ow5dirasuek.com

    DNS Response

    52.34.198.229

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    64KB

    MD5

    1c347f2656a9aa3867ecb159f99856d4

    SHA1

    3d88ae5cbb444b98c515e00507cd3d2063d42d51

    SHA256

    48e8a3f4939995f5ff2fc1fa5a8e2ba03897d0fff924f28c51ed3d55a07b98a9

    SHA512

    92e832605d20876945463d924a993eabae5aa9a74f2816bf71949466ceae2013f09c50ec3808e79943ef7a3c2b7ed81e7155c8377b3e62885c73cb652a9f080c

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    64KB

    MD5

    5da73bf637fba84a7388adb2617192e4

    SHA1

    fe7f4bed7f004a7efa3e9e4e2464e20e18b36a59

    SHA256

    082fd0f9573aee5e62f395c69fb62924e5c0c48ee7d223954c42df160426f755

    SHA512

    c5c0132f756bcd74da7f00463d8a4ca999dcbce4cd28492091291cd33b6a45df3f85578bfdde008b91a6bf8e8af40e817e13beef5a985ad21e7c2cf482c93185

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    64KB

    MD5

    67bee810250bac5845ca7003456d51f7

    SHA1

    5e97e1d2dbb68ca9a330c79046fdd1e5fbadd892

    SHA256

    930c9d0a601a29ca5d46277b5f0139f48a1b12ad6aedb3e0f918f35aa997aea6

    SHA512

    ed7b35e24b5b89456a6fbdea44ec26e7ba33ef2e11bd00621f76cb603d744f339fd71d83b3e2f4da230b41c56536d0c33443aba9473caa3913127d09a55eeb88

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.