Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-01-2025 06:01

General

  • Target

    00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe

  • Size

    80KB

  • MD5

    50364cbcb35131975258fd8d772c8430

  • SHA1

    0781f40b409e2e09bd5a8cae52d659ac5fb55534

  • SHA256

    00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9

  • SHA512

    8fc1aa4c26cbe873284cdbf45d87d13e7d9646c028671d91289fe55952ac087c2469a61595bcd447211ba4bb55b05624d43d916931414b30da5246939d2c196b

  • SSDEEP

    1536:Td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:TdseIOMEZEyFjEOFqTiQmOl/5xPvwN

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe
    "C:\Users\Admin\AppData\Local\Temp\00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    4d443946764162f55497225872ed55b5

    SHA1

    ed45491420970816627535c7646f380c8b05052d

    SHA256

    f5470d09fd41bc7c95e4d7d831bbf725ac862ab55f2762fa7699960ec281b1c3

    SHA512

    60b6dcb2ec5ebc43941e0709e75e8d83761474d03461a7ab7b269697e92d674602c093cd99dcbc23fcd95e93af8f104741d51705195ff4b97f837cbe24bcb800

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    30b151ee9b1f8e0ba28b6a1a1686da14

    SHA1

    a0e2ea29361dbb58f32d429db1adb17d9cd6212b

    SHA256

    b1f559f066a2a9e0f5cc40335996da20e515e8f859e7066d35663462a9c5a222

    SHA512

    2815e4c9bc0dac855bdcdc7cab6351aeafd7131de5408cafcd8a09aaca00dbae8f39d15cf78738c1889805777e6ae1fdca123953dc62d9477d43062194655f54

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    1b400a9df8171e0aa92e5ce48ddb4937

    SHA1

    d0e908c5183704dd7e3edaba0c822519ee532279

    SHA256

    f66bddcc73a7488c8dec8fca66d3e5dea12e4ea8cae893905ca671969c892c52

    SHA512

    ea69c873e9234508d1391850e4949c2b0ad2133af13bb1e1c06addbb9ef7ea73818afbb57631ae1b8441f91161bc4a6ff1e211893e320fb2c0ee6d4cdc43d95b