Analysis

  • max time kernel
    114s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2025 04:20

General

  • Target

    6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe

  • Size

    61KB

  • MD5

    b39f829b6686b24bf83dd1c07bb4ea00

  • SHA1

    dbea6a04c22ce7935ec1a3835571ff69ac878573

  • SHA256

    6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362

  • SHA512

    e5f7c5270b49afaa3ef6369f6ed7d441156b6c4c8d4b0790585545f13111eea1b3a09690f8af993e96859f630c43fb99f2a9d8d73dd402139571e30861619f22

  • SSDEEP

    1536:cd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ4l/5P:kdseIOMEZEyFjEOFqTiQmil/5P

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe
    "C:\Users\Admin\AppData\Local\Temp\6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    98a72a1c18fd244939887d2c37bf6e9f

    SHA1

    2a243e0c72cd3a6fd60a846648ef6b4ac4e5905a

    SHA256

    1da5fadb236e26beb9ffff99f751ea23df815dedc0d8cf82563c8fb5f5bcaee9

    SHA512

    15e6a8e65892328488facfb1ad49581e163b0622b82736a880bf5f82947fdced61a2f6a0ff049717a0b76a494a05b27d37af0da1e45c3d2b22918c1aa73b114b

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    ab14be5452c9deab0b7932fd1af035ee

    SHA1

    e9e7abb7e3b47868e0f0082c0a4dde74c5e41c55

    SHA256

    b4d631c54725c994fc29e153d90c95b8759d15c7daa529b4d8686a1519141371

    SHA512

    e04c4fa25f8084d972f1820afbadc99eb50e3994ac4aacbc2a558ae93eeade98b0cba24ffefc7b60c7d14cfac992cc1046e8c4762ec8da3ac68e5cb605ae6c54

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    4b7367bde27812908de61d71ec620c08

    SHA1

    6e8e873fb842559437d3dcc13030e47eda63b30a

    SHA256

    26992c45fbe0df62cdf6daed97abbe9730b26daae5c381ee88a7351414986186

    SHA512

    b185934c14c0b937d0908120200db40a51164a85ab1c1e68397e9bd0d4f5dc8e8543e47b9eb5493f79eb71aa2bf7e496d8b2ebe9aa2bdbdf7890500a31476839