Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2025 20:35

General

  • Target

    JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe

  • Size

    68KB

  • MD5

    d1c0397f95c70d883635c76d911a9d34

  • SHA1

    a38db2e6e202fcc2e518ab10bc469bee5c188257

  • SHA256

    5d8f6b81dfd784dcf6cf046790c49f5450fd94179a47b79bca98f70b991a0278

  • SHA512

    9c2d990971ae034c69283a76933b35e4f93e32df5e5d885af8dd1e534974005c65af85482799bb6aa65e1afc0e03abec02c1c1273805e17f66cd8ea7a1fe0d71

  • SSDEEP

    768:5MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:5bIvYvZEyFKF6N4yS+AQmZTl/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d1c0397f95c70d883635c76d911a9d34.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    68KB

    MD5

    c99b6b58f27735c8fd06ecce7dffd029

    SHA1

    bbd74f4e877fd149006be112823cf47e06f8348c

    SHA256

    4bcd9058a25b2c69e46ccd2455f1e0f8df0f86147996086d94f1330e8ff3e5cd

    SHA512

    3408603fc5acd076af622b21ede0fe7178cedc628819d7232ad18427039457c575a1767c1c94e4348206fa8ece912b7ff64b5e2dfb910cf8c2cb8d5aae429a60

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    68KB

    MD5

    7f86ccfd9beee3f3aab42c09d974aa8e

    SHA1

    cf112ceba34535e4d7d85a5a9f29a780ea48716d

    SHA256

    805ac85a677aefdb135992f5ace9d975d34f808b2dcf885633ba796f5e8fec5a

    SHA512

    89ff304f0ba7ed20cd5ca28a21419d16b21fb4511ba6c52767aa6e93271f17e38af617e1b89b4a561443a5aade135f22f0fd6a5eb2e38e4c6f9f57e72d506064

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    68KB

    MD5

    87779ef1161deb677d806d1a426b51fb

    SHA1

    d41e04768d8090016a164da2ee62054c6b882242

    SHA256

    9438f3290b4af3b35a76affe6138691ebc67ea63f8514d4204c4e7448ff1465c

    SHA512

    3cc59910d04ed68d7e469710fe0e4ae6fa3856ceb9a656c1aadaa42d67e5ff72f0626eb5f64699585511e5b4c5fbdb944133547edd4ecdaab7d47ef565c2580a