Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2025 12:29

General

  • Target

    1dfd636cfeebd277f6002b5f67a5b7dad944cc7eee7dc7d6af4304872a2a0befN.exe

  • Size

    71KB

  • MD5

    48682d6687e1a75f503c0b129b1fa620

  • SHA1

    b7e9035958464425a9e3f58e755f6e67391ee915

  • SHA256

    1dfd636cfeebd277f6002b5f67a5b7dad944cc7eee7dc7d6af4304872a2a0bef

  • SHA512

    8102857f2ab37d01e0bf3e4680a640ecaa7e2a9ab31089d07857bf8c630a57b9bbd1fdcc6837b9ff3ed151d11bc691a450c8e40285d917712fa17da0cf3d643f

  • SSDEEP

    1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHf:XdseIOMEZEyFjEOFqTiQmQDHIbHf

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dfd636cfeebd277f6002b5f67a5b7dad944cc7eee7dc7d6af4304872a2a0befN.exe
    "C:\Users\Admin\AppData\Local\Temp\1dfd636cfeebd277f6002b5f67a5b7dad944cc7eee7dc7d6af4304872a2a0befN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    dc4d4f81fcd967e2012054da7bd24188

    SHA1

    602e9bf95cf6def026a4d81bd148e6d73ffabb35

    SHA256

    8495593b783307bfec5649fff026469b49517e0b72f7403463670d106bfb2a9b

    SHA512

    10112355846e9986882ab5b943bea96ff88d8f16cbd38056ee322b4314cf958c9a6313b0e70429cdd86c773342da645d3916d3f67e6994a126e6829bbe04e832

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    1d507b5b3ffe96eaa5c316017537d827

    SHA1

    27fe876d6415f6aa1f5f4ef938c1a21c781c74e2

    SHA256

    de69f1e47a09f992b7ee3ee081d4653f7925af3020c75d6205d41b8450d393df

    SHA512

    89b379455232afa9ea57cad4701d6b66340e2aab988cb84d7e364155eaf2d83b35ebe67d7e09a9e4ef888af18421f8e9814bfc0ee947def21e5d98bf67c50412

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    b148205a8310c39f1a29722641f5a437

    SHA1

    2b5f81b14b5c9f052945fc7cb6616bd1bc638fc7

    SHA256

    728df7e25a30cf7b01f06539568b55a622a1159da34810b124b9adbdc93f978d

    SHA512

    78969a825066635b0ed3aa592d756f4ea384424cc0d57d3f6bfae92c7820e04a84264c2adc99993ef6a778bcfcdde603d3628b852a29f463dcf9fe3d774ce9df

  • memory/1644-32-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/1644-37-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1644-27-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2120-9-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/2120-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2120-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2120-4-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/2320-40-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2452-23-0x0000000000280000-0x00000000002AB000-memory.dmp

    Filesize

    172KB

  • memory/2452-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2452-25-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2452-24-0x0000000000280000-0x00000000002AB000-memory.dmp

    Filesize

    172KB