Analysis

  • max time kernel
    114s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 04:03

General

  • Target

    f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe

  • Size

    72KB

  • MD5

    71217ef9bc8fb2678221d2fdc3760f90

  • SHA1

    5cd3794c1f6ac6b7ec34c7b9fd0389e9943d400c

  • SHA256

    f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c

  • SHA512

    32652b61fc9d56d7f338d85a2f87db0acd233d64d4f769428cba122fd241dee1f049f7d04d518ca32775fa842c18a7698fc00d3b3df96c6d9a32ef6788f645ef

  • SSDEEP

    1536:Kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211t:KdseIOMEZEyFjEOFqTiQm5l/5211t

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe
    "C:\Users\Admin\AppData\Local\Temp\f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1860
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:524
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    72KB

    MD5

    e40a87a3b051e87ffd402662afd0acbe

    SHA1

    8265c181b98055ba7e87c17ac3858f308aed7c11

    SHA256

    fe66678a433532088a3f36df4bd55a2f60ca8b7d0effaf146e5ddeb485e56c03

    SHA512

    8fc0b5f6d5c7b3f9bebdf85e56bc5a8ba9b5b9ab8657ffe75b20fa944f8577cdc274b66ee5bd39324a5256bdd929926aa886c79bd6c9cc9fbdc62f93dcb6bdf4

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    72KB

    MD5

    195a82aaf67cfd82dea64d6f54dc5e3c

    SHA1

    a27f39cd5e09a420677e80699e3195f57db3c8ac

    SHA256

    72b3171fe3e2d0ba46ca49259954040fcddb7a1246e92ff985e92f04f36487e0

    SHA512

    cd3e4052474eec523bafeb315271ac8a29a6dc1393a756363ee20e85cae2fe812e2c8d8942ef08591459dfeb2518732a376c0788cc1d10a329457c8398b4e4e8

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    72KB

    MD5

    965f147d5236774db6f73e0304e5b421

    SHA1

    677c1276ab2e2d379a11f81055b320b499cf89f3

    SHA256

    015f73773c0bb530f82489f47a4f7c79a763d42fc0995e6079a9bbd6eefa4f91

    SHA512

    b29d6a975f54d9b4dfa35be7e14a0c366361987f5b47e5453d94d51818e04e95fde64429b690972fae906699b409709c6f1c881ec68e7c3ceacb5c8ffce0abe1