Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 02:42

General

  • Target

    8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe

  • Size

    92KB

  • MD5

    c787be34fed9da0b7e0cc61ffb5491b0

  • SHA1

    91a99a52693ae79932866f7e13c28c627669bb53

  • SHA256

    8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9

  • SHA512

    5bbf2274912ae12e6191bb4a5434438a5f84cbaf8e06977407a1426de2ac5bb4a1753bcacbe47ee44da183010d3f629b7dae906301bbafbcf1fdc5401c9d7c6b

  • SSDEEP

    1536:Vd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5f:ddseIOyEZEyFjEOFqTiQm5l/5f

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe
    "C:\Users\Admin\AppData\Local\Temp\8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    92KB

    MD5

    6156a874680b83f66bb4ae74e59c5bc2

    SHA1

    fcbc055b5c57025cfa7acf0310d386c6d0a79c92

    SHA256

    23332e19aab915072c6ea6ff412edbd377711528c619bbec78589c45048f099a

    SHA512

    3683499583b778827229360d11dc4fd148165df63acabcf51340c308d6f4af6bf2ec43ff3bf2d786b3a308266e509eb4518b065d4e882bdea0f0612fa3e91e20

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    92KB

    MD5

    6223eb31dc6bf2082c93281ad5a0e0b4

    SHA1

    e46e7ef2a9a2b060487be2c9b949d0ad3a5c352a

    SHA256

    65fd499bc62eaab8aa774c39d621e878c842daa8a821be022b8054558f06d8b0

    SHA512

    eba8b58cc8292ddc0e5f1f2e5c07500ce634fb3c2688230cba9639cec2c883f05cbee105bda112ef030275827d3083e27ec7d20bb3e3077e31a3a2f1e1d24dd3

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    92KB

    MD5

    1ebf150456a311b1dc3e7be875ad1dfb

    SHA1

    58dc6f1759193a092d0d332f0af9fd0851fa92ab

    SHA256

    94442f615cef9ee6151aee805f1e6874b06ea4a49b2e355c022c97c448b4946a

    SHA512

    e88f9b4fd045fa7967bdb27261e485540f596feef3cae2d25ee2a1ba83944301b3afb4e1c1410503afd73ec51f4d9a45b1ecd2077ed146439e95ec8abae6945c

  • memory/1332-40-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1692-24-0x0000000000470000-0x000000000049B000-memory.dmp

    Filesize

    172KB

  • memory/1692-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1692-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1692-25-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1692-23-0x0000000000470000-0x000000000049B000-memory.dmp

    Filesize

    172KB

  • memory/2372-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2372-9-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2372-4-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/2740-27-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2740-32-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/2740-37-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB