Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2024, 03:58

General

  • Target

    389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe

  • Size

    90KB

  • MD5

    519d867d24254fc3f17e4aa7f280d060

  • SHA1

    2980ef9482ff89981063de72b4dd89feb03c9656

  • SHA256

    389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6

  • SHA512

    78734a35028a4ff3192a055aaf114cbf80e3468d5b2363ad15aed0e09928b2fcfb0e5e1389825ebb0c8658c33adf8381c71078f5c58ec7f653d8872e5d55c9f6

  • SSDEEP

    768:qMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:qbIvYvZEyFKF6N4aS5AQmZTl/5i

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe
    "C:\Users\Admin\AppData\Local\Temp\389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3936
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:4488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\omsecor.exe

          Filesize

          90KB

          MD5

          59c6ecaac396fc940cb6ffd457891e9f

          SHA1

          3d41dfd0a38f7ae7b4ebad41deffd46c5a3f884a

          SHA256

          8fca02e144bc770044d73c5a34a64914e29c65a6e02ea6e3d4f0ee3cfa49b5d2

          SHA512

          46cf907413f5cbf980d9f931cba3468080df8ad91e2d063f3028922a1000c857288f383c824cc9f64117ca90e0c05b6ba165daae7da090f176298f9980efb1fb

        • C:\Windows\SysWOW64\omsecor.exe

          Filesize

          90KB

          MD5

          78b4ffc9d4c918b41dc4b76393394ba6

          SHA1

          3dca0860ef5fca3a85d3745d34108c73b7106f87

          SHA256

          f7dc3edbe0eb30cf4e4acfb7699df90ce45e4e218713c8daf5a28dc2cd6b2911

          SHA512

          329cb000d1531302de32841a8e7667eb13f17568aa025a1b5a831b5daeb413d6d586f2eb2d082aca90589b0b910ecac943951e2d97bae9c62e9982ca078c36b6

        • memory/1648-0-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/1648-5-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3936-4-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3936-7-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/3936-13-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/4488-11-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB

        • memory/4488-14-0x0000000000400000-0x000000000042B000-memory.dmp

          Filesize

          172KB