Analysis

  • max time kernel
    115s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2025 00:58

General

  • Target

    735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe

  • Size

    90KB

  • MD5

    0f4662f4a3e895d04e9545bbb712e8d0

  • SHA1

    32344fe5ff404341298aceae54e1fb5961afb94e

  • SHA256

    735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3

  • SHA512

    6ab8c15638f42a00dd373099ae46baae3e0668e8bc096e573ed4158d2fdb115d003f2245ba02bd1f68489380a822f8549d6b1493dba6b9d5b3b120bd7efe0157

  • SSDEEP

    768:zMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA6:zbIvYvZEyFKF6N4aS5AQmZTl/5C

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe
    "C:\Users\Admin\AppData\Local\Temp\735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:3176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    5c6595cbc6600107c4ec47c15caf79d2

    SHA1

    48abdaa3a16929f1bc6a09d1c073e6151a61561c

    SHA256

    a248a3df8f62406020a1e9a961e94a35946741ed705acb0edfdce190a7856585

    SHA512

    775ab21c8da8f73efdd377447abd4ce80642eb1f60fb9d9874de69a0f19b3564aeec57716151a60ed5fe5f8268508be5031a2fd22eb95d2fbe4637965fd7fbce

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    90KB

    MD5

    28fd224e88c14d761958210a94b735d7

    SHA1

    3a692b40940b05c0e59e91dc51ab625f41949aae

    SHA256

    82c0cf1766f95e910de5fcdc7d1707f2df33459cfc8e2298c10eff4ff5dea583

    SHA512

    bd6c51ece6dd66a4e9edbeb49967a34ae1507ae2e74be8bd33583b7169708bbe31cc229ef5b743344f38179e7d48b18b909fd4f617dbe3f49f160f28afecd8fb

  • memory/1728-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1728-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1728-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3176-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3176-14-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4388-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4388-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB