Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2025 12:32

General

  • Target

    d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe

  • Size

    71KB

  • MD5

    19b264530ebd88a4daa31dfde236dfb0

  • SHA1

    77ca31c073d38dddd69c7285e03af799943c5459

  • SHA256

    d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6

  • SHA512

    1591692d119663c9d69388405884e98b8957fdb16391b6939565035d1174dcf1d187769acfbabb970578ee2bf83583e9ef1d8ae6d486a1ac6a236deef7d4c469

  • SSDEEP

    1536:0d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHP:MdseIOMEZEyFjEOFqTiQmQDHIbHP

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe
    "C:\Users\Admin\AppData\Local\Temp\d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:112
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    928f6081f6f7c37985eeeea6d7dbdbf3

    SHA1

    26d893ba535035dd88ec535b4ffd1a0338d906a4

    SHA256

    71654e22d208d6aa238834a6f218c5e2c15758eae10277c39314c124ffa95e5c

    SHA512

    50a54ba9ae8fe9ab48c07ed34d507214c27e64ca0d129ce14fb4ba2c002412d82a7404619328033196b5c2b348f69e734500b1aea4b9e00d6f2cae193daeda0d

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    8686ea52a74216cf4f245e61119f092e

    SHA1

    a88c66e8ffb852e2f9a8990e6f573bf8b16d9b81

    SHA256

    422f477c978d15a2cf3b55ee29a32b6135891b08560111f2ede7c3924186aa3f

    SHA512

    9075c6838b362b8d2798c53f18a6fc719fa925cb0374ef3b951f5954267303534534749198d494b2be067a7d87b9c32fbf86d903120e6d277051d91227f7a6e9

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    e2ca68d185c8ea2e850c261e808f739b

    SHA1

    ec648fce84d0f3ec06e8c3222daf487ecd0b5916

    SHA256

    ffc6a978ac08df5bdcf6217bb52a4e17bd210828351f2216f01d68b3a61251bb

    SHA512

    67ae3ab9a70c0b1fb66f338103ac62269e87397bdf2a5e20afba7d91b2cd3c862dfd39bbbeee5e93bda1915741dd1165284902b2934b46ce1f314512ca2b8076

  • memory/112-28-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/840-38-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/840-36-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2428-4-0x00000000003A0000-0x00000000003CB000-memory.dmp

    Filesize

    172KB

  • memory/2428-9-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2428-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2916-23-0x00000000003A0000-0x00000000003CB000-memory.dmp

    Filesize

    172KB

  • memory/2916-22-0x00000000003A0000-0x00000000003CB000-memory.dmp

    Filesize

    172KB

  • memory/2916-25-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2916-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB