Analysis

  • max time kernel
    115s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 21:27

General

  • Target

    9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe

  • Size

    80KB

  • MD5

    cc96a448da3ece78d16d94604b43b985

  • SHA1

    424992ddd6f9af348df53e5d084945db032bedee

  • SHA256

    9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077

  • SHA512

    a9266a10afceb0456b18b23f171263a77ab80b55c5b9fd631c673fdb0f0ac80eb8d3b2f675e487a76fe47e7bb12a4280b08de78ca4fcbf8d446c153a3e6d8204

  • SSDEEP

    1536:pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzT:pdseIOMEZEyFjEOFqTiQmOl/5xPvwX

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe
    "C:\Users\Admin\AppData\Local\Temp\9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    4ab95885156eb0c7b76a8d6409bcb777

    SHA1

    882780a57600124af2f6a8cd17dcaf7e4f454352

    SHA256

    1c306811a9b15b7f80b78494a31208217709eb26b324c23dbca75b504341fda2

    SHA512

    2b81f79df7f4cad9e0314004026f4489d5cdbacd99617f4ec72a7d372a7971fd535b7d40d15dc5c76233202ea7320a00d8a0225e98469dd427d10127ae1836c8

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    1b06d285a05dfaec310061e5b0857a33

    SHA1

    4da4e17e1ef186c8e9184aac9ce24bcb74578340

    SHA256

    02b980eead4fd2bb4c1d1e9d61235de437f0c42c8c723a36bf1936d27a730ba1

    SHA512

    b6af4b397c722465762cd46836733ae6df7e7b42282b2946c726982fb8b98c6a5306188f473f7a2ca12919ca9c008a7e1159acf4896fdaf476d45cc52b93d143

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    8947199622cd1c8667d7502ffa16b947

    SHA1

    06f60c84d71d6c74896b7a632a616d483f8c202d

    SHA256

    25f2bf514f47c76453a2fb8727385a6cb7c4cc32f636b36cfd9647d891a58895

    SHA512

    1875d25ed2a9eaefd77ce411740f5143ab71b467f611cb4a9f0efa3aba6302cc7668276413ca0d78aa746fef98168aa8bb80aee1f40d77fc35b706a18a0c06f9