Analysis

  • max time kernel
    115s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 20:43

General

  • Target

    0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe

  • Size

    96KB

  • MD5

    1d3f9f35f940830fcb77a46d7848114f

  • SHA1

    5ceba8403897681c7be2b8969e610e5a17700771

  • SHA256

    0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb

  • SHA512

    d4ec2cb23d8f34eda5076914efe135121294af45473c44c032a54936df95c89e635475eef72ae67d5d382567f97c6088fed6d9067a2238fcfaa0e3799c1d0ae6

  • SSDEEP

    1536:nnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxu:nGs8cd8eXlYairZYqMddH13u

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe
    "C:\Users\Admin\AppData\Local\Temp\0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe
      C:\Users\Admin\AppData\Local\Temp\0f568ed48edb15b1cd591aeca58a50c89a7019425e45469e37dd5f65c74f21fb.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:720
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2916
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3520
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1968
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:836
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4468
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 256
                  8⤵
                  • Program crash
                  PID:4876
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 292
              6⤵
              • Program crash
              PID:2144
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 276
          4⤵
          • Program crash
          PID:3960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 288
      2⤵
      • Program crash
      PID:4068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1596 -ip 1596
    1⤵
      PID:4524
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 720 -ip 720
      1⤵
        PID:1008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3520 -ip 3520
        1⤵
          PID:1248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 836 -ip 836
          1⤵
            PID:3672

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            0940a04319226d0436ca2116dded686f

            SHA1

            74cd54c88bf6fd3eb993785931e1e340b41e7847

            SHA256

            696df67b336da41dca0ac044e2d3a51b9b45499c4fe1ee161287e209144b8554

            SHA512

            df13cdf4572e3b32ef551f5cfec80e351ccfcaf2ee1e64a157e4b1d8d1d4b2d7b9d03525627c8917f770c8d04d4e2d680d196a026696e6f220765edf0314b4b6

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            6d321317b860315c1a99cbab4c4a67ce

            SHA1

            d537f1fd558ae34ecd2249ed6d59f00e2ec76a94

            SHA256

            92ff0fbb65f70e7232ce7a611f63874094dd3cec2949f7c125f3673ea4fba711

            SHA512

            4046d233fc2af4b5e07b6182129e54932e9bfa8699af353f1f5fd99d4a33d2ae77ead0d1cbe8afa841164478f92d25b43dadada6bd30857ce4f6d449e526e96f

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            641549c2f6337acb9832e871ef66fd53

            SHA1

            61099e708c531b90b79509719d11a8d14010e107

            SHA256

            01ec1536f1131853e71e2ed565f43b602c511cf7b1f451ef89e4485e30eb81a8

            SHA512

            8b57d049469aafec132cd8a1ded555f03ad1fd538cbd2fab44df63882b6809cfe4173f01032a20c2b2a0ea4fce6131b80a53f1b0048ef453d790c2ecfb3ad7d5

          • memory/720-9-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/720-18-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/836-44-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1596-19-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1596-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1968-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1968-40-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1968-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2176-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2176-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2176-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2176-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2916-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2916-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2916-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2916-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2916-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2916-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2916-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3520-32-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3520-52-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4468-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4468-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4468-54-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB