Analysis

  • max time kernel
    114s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2025 04:20

General

  • Target

    6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe

  • Size

    61KB

  • MD5

    b39f829b6686b24bf83dd1c07bb4ea00

  • SHA1

    dbea6a04c22ce7935ec1a3835571ff69ac878573

  • SHA256

    6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362

  • SHA512

    e5f7c5270b49afaa3ef6369f6ed7d441156b6c4c8d4b0790585545f13111eea1b3a09690f8af993e96859f630c43fb99f2a9d8d73dd402139571e30861619f22

  • SSDEEP

    1536:cd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ4l/5P:kdseIOMEZEyFjEOFqTiQmil/5P

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe
    "C:\Users\Admin\AppData\Local\Temp\6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3524
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    38de941c31e93aa9de200488441753fc

    SHA1

    226915f416c76828cb41da33345360558551bf4a

    SHA256

    7f770564cb47e0250086e36b9f62a3b94b2127db76ed63436e8b3f71be761da5

    SHA512

    9510d038f41201b2aa7590ae20919c9b4a36c15d19400629683a4df3b02094ac218d85777383068265a7fec05dfc402e218a531a23d4ee6b0e81d196b89459a3

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    ab14be5452c9deab0b7932fd1af035ee

    SHA1

    e9e7abb7e3b47868e0f0082c0a4dde74c5e41c55

    SHA256

    b4d631c54725c994fc29e153d90c95b8759d15c7daa529b4d8686a1519141371

    SHA512

    e04c4fa25f8084d972f1820afbadc99eb50e3994ac4aacbc2a558ae93eeade98b0cba24ffefc7b60c7d14cfac992cc1046e8c4762ec8da3ac68e5cb605ae6c54

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    b00e1299e1fe3cda0ed1161ab1ada5d7

    SHA1

    ac11de5e272162cd4ba97b9874d3075e36b7d591

    SHA256

    35349768b1fe3a6c94507dad6c06b8e2786d3d76588fbe3711ba347ceed57e23

    SHA512

    693d9600af61691c3ce5d06cd4763da62f82195aea07c84a0350b770c36edb92f9e640afa6c76039898d1ff9ddc6c68f1ad6af20dcb7a9a83fcc6e315476893d