Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 16:19

General

  • Target

    24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe

  • Size

    89KB

  • MD5

    bbc94aacd015ca2f333cdd6830a88520

  • SHA1

    e70f0f5184d16f9094ddb4826be8f2fe85b0c6e2

  • SHA256

    24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8

  • SHA512

    2300af48bd6e724b2015c12a05ccbe17383d703a109cae0ff68ef1c42fb0ba3b3921006fe5e7594f7467598fcde76f31e135c8f99efb7dcd14528aa610897f78

  • SSDEEP

    768:V2MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA1:V2bIvYvZEyFKF6N4yS+AQmZTl/5d

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe
    "C:\Users\Admin\AppData\Local\Temp\24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    89KB

    MD5

    1f6542e1751bdbedcf75b9a84acea408

    SHA1

    ca59c78eae82d32d63de23bdf0e3fa3113f56857

    SHA256

    60cc9df907a404b6cc8d53805913183dcf3e998d745e2adf4a207eea822f0674

    SHA512

    4e779d31a6833171b9b3c8a96ba5ddc3938a45fd3200b3353868f20ac0da1d059be947648c929fd1eaff0004ec3b2afe77fdd496d51eb2029a9f78b0979bb4e9

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    89KB

    MD5

    bb5aaf0419dbc078daf39c809a1f0951

    SHA1

    8cba83d5ce45c4c9942e720d91308a6c33549f97

    SHA256

    1265391da30a5a52fd085b53b70785b6e222a2ab7f9c62c98a7ed6d6474bb0ed

    SHA512

    b523c52ec3c4589a7c357e169898cb8e545f605073b7c2a0b581c250e93fcd2a75b829aa22f3a09fd68d8a7ffe1e523aa3be596e3d9ced3977135ebf9840e9e0

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    89KB

    MD5

    82eff2a9ce65fb45582db6fb7069a052

    SHA1

    e6a8ee336cbd4514314a576985b039066ab18327

    SHA256

    f1c0af595b398eecbceb6f7df8e6c7447aaf33eaece8c47ad09b8953ce111892

    SHA512

    3a291d9fc3f7b76fa2e731f5482856b3463e9f2f82dce70883b151c797494397c2e335c7ef3b78ca82fccbf21d52818001507107d123992f02944f4e2cd5b838