Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 12:29

General

  • Target

    1dfd636cfeebd277f6002b5f67a5b7dad944cc7eee7dc7d6af4304872a2a0befN.exe

  • Size

    71KB

  • MD5

    48682d6687e1a75f503c0b129b1fa620

  • SHA1

    b7e9035958464425a9e3f58e755f6e67391ee915

  • SHA256

    1dfd636cfeebd277f6002b5f67a5b7dad944cc7eee7dc7d6af4304872a2a0bef

  • SHA512

    8102857f2ab37d01e0bf3e4680a640ecaa7e2a9ab31089d07857bf8c630a57b9bbd1fdcc6837b9ff3ed151d11bc691a450c8e40285d917712fa17da0cf3d643f

  • SSDEEP

    1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHf:XdseIOMEZEyFjEOFqTiQmQDHIbHf

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dfd636cfeebd277f6002b5f67a5b7dad944cc7eee7dc7d6af4304872a2a0befN.exe
    "C:\Users\Admin\AppData\Local\Temp\1dfd636cfeebd277f6002b5f67a5b7dad944cc7eee7dc7d6af4304872a2a0befN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:64
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3108
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    509f117c801594ba9007677e44767d63

    SHA1

    7b894b37a1ba880edbf7a32cbd6d888ac38cb7de

    SHA256

    6900c0a48a25e3397eccb140f11e41731df2dbccf80cb98c7fe3ed14be9595ab

    SHA512

    92c8d2d3ed754b5337be3849a07d757b93a2e55235f74d24e65f563f25b5e900d7330113b38278366bb0c186a6ee64b79d052c9e2d257a244ed51c1e2875bc31

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    dc4d4f81fcd967e2012054da7bd24188

    SHA1

    602e9bf95cf6def026a4d81bd148e6d73ffabb35

    SHA256

    8495593b783307bfec5649fff026469b49517e0b72f7403463670d106bfb2a9b

    SHA512

    10112355846e9986882ab5b943bea96ff88d8f16cbd38056ee322b4314cf958c9a6313b0e70429cdd86c773342da645d3916d3f67e6994a126e6829bbe04e832

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    be66c7fde33e656f61ca1da97e2eaa1a

    SHA1

    f281e2c38d26b3d1fc92279b9efce92da95dd8fa

    SHA256

    38749c3c131242c14feee6ab3a00f37c77f5e646e437204089c4b1c84ad9b2df

    SHA512

    05de3c269820581baac9a19f983707a081c10f8b5c8cebe6a938090d40bc4ada946b207cf111c07816fa5829977833c66f90f918ff2ee549f9df0b3752525235

  • memory/64-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/64-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/64-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/224-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/224-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3108-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3108-17-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3928-18-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3928-20-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB