Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2024 21:27

General

  • Target

    9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe

  • Size

    80KB

  • MD5

    cc96a448da3ece78d16d94604b43b985

  • SHA1

    424992ddd6f9af348df53e5d084945db032bedee

  • SHA256

    9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077

  • SHA512

    a9266a10afceb0456b18b23f171263a77ab80b55c5b9fd631c673fdb0f0ac80eb8d3b2f675e487a76fe47e7bb12a4280b08de78ca4fcbf8d446c153a3e6d8204

  • SSDEEP

    1536:pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzT:pdseIOMEZEyFjEOFqTiQmOl/5xPvwX

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe
    "C:\Users\Admin\AppData\Local\Temp\9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5064
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    414b303d630df27218e3afd36ad55280

    SHA1

    4780b15a5a55fbffb117d0f8e3878f29e25fd884

    SHA256

    776037c7be6b35a1ba885b58f19efbbbdec8e768b493d078b1e21715ae75249a

    SHA512

    1e4f276c878d53c2293e941e8e2639d6874f1f76fedf4621d8ac9692a2f1b0f600d5fd50636cee28844354f81d1eb595a1ef8e63aa3acef81fe014fee896c092

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    1b06d285a05dfaec310061e5b0857a33

    SHA1

    4da4e17e1ef186c8e9184aac9ce24bcb74578340

    SHA256

    02b980eead4fd2bb4c1d1e9d61235de437f0c42c8c723a36bf1936d27a730ba1

    SHA512

    b6af4b397c722465762cd46836733ae6df7e7b42282b2946c726982fb8b98c6a5306188f473f7a2ca12919ca9c008a7e1159acf4896fdaf476d45cc52b93d143

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    945f9b960cd6ee70ca288d905bbdc6dc

    SHA1

    da96151559f69923fbc633596b724a06db5ad530

    SHA256

    2b2044713b16a40c7ee0d37abf5e3db82b30093de254ba8eb2e70588caa0c18e

    SHA512

    918147d78d5e467f387714154361f2d548e98cc27bf4f877be9dbf39b61b1d23116818e6e2c645ad293b05ad2d4de979e7a6763e7dac25eb9a6a559bf7c06373