Analysis

  • max time kernel
    114s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 12:32

General

  • Target

    d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe

  • Size

    71KB

  • MD5

    19b264530ebd88a4daa31dfde236dfb0

  • SHA1

    77ca31c073d38dddd69c7285e03af799943c5459

  • SHA256

    d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6

  • SHA512

    1591692d119663c9d69388405884e98b8957fdb16391b6939565035d1174dcf1d187769acfbabb970578ee2bf83583e9ef1d8ae6d486a1ac6a236deef7d4c469

  • SSDEEP

    1536:0d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHP:MdseIOMEZEyFjEOFqTiQmQDHIbHP

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe
    "C:\Users\Admin\AppData\Local\Temp\d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3112
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    009f4b308a07f930f5737059fa877701

    SHA1

    f040d62232d6f57d2691358df8dba5325a160c1c

    SHA256

    be607871b3b20ae7449819811664ced3c9ee56db7560792bf7c3b10dbacaf684

    SHA512

    7a1f398af880762234791bceddebf0ac2389c958f0c8bbf6b108a6e1f616b7ef8cd9d43c1e638e03d5ce3c3cedd2c8b0aceeb11a5da22c59232e567924381de2

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    928f6081f6f7c37985eeeea6d7dbdbf3

    SHA1

    26d893ba535035dd88ec535b4ffd1a0338d906a4

    SHA256

    71654e22d208d6aa238834a6f218c5e2c15758eae10277c39314c124ffa95e5c

    SHA512

    50a54ba9ae8fe9ab48c07ed34d507214c27e64ca0d129ce14fb4ba2c002412d82a7404619328033196b5c2b348f69e734500b1aea4b9e00d6f2cae193daeda0d

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    ceacbe05bb2766a9f57dd8db55725250

    SHA1

    7fac70244c97cf2d2952807a2e9811e8e2cfdbfa

    SHA256

    c6d46b123f1ca325f1d63f5ff9442301b4ec9bff6670ded888df2528abe20691

    SHA512

    2a77fc6945e5462aa9d8ebb65f1f7bfa146c1cafe13abdac61f26a383de7a0c0c7e2e22246d03d11390cfe6e2bb28ddd72bde19a3ec1a92306fbe85c1ede6ab5

  • memory/2176-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2176-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2176-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2800-18-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2800-20-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3112-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3112-17-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3436-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3436-5-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB