Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 04:38

General

  • Target

    93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe

  • Size

    134KB

  • MD5

    dc35c9d2c141e65a01fed54e5f4b06fb

  • SHA1

    87b929eb932881f275296c2c8c4bf456613a85bf

  • SHA256

    93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21

  • SHA512

    878ce2e60ea0516fa51109eaf17b561499eb77c8e927c7ea5912a85f6e552aa3c0d75addaf27af5b20c89b7d812b4588076199a409b14c977c96724d71e9c997

  • SSDEEP

    1536:XDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:ziRTeH0iqAW6J6f1tqF6dngNmaZCiaI

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
    "C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
      C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3780
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:212
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4412
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1252
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2576
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4992
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 256
                  8⤵
                  • Program crash
                  PID:3904
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 296
              6⤵
              • Program crash
              PID:2444
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 300
          4⤵
          • Program crash
          PID:3492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 272
      2⤵
      • Program crash
      PID:3556
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1680 -ip 1680
    1⤵
      PID:3660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3780 -ip 3780
      1⤵
        PID:3184
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4412 -ip 4412
        1⤵
          PID:3972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2576 -ip 2576
          1⤵
            PID:4976

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            134KB

            MD5

            3db02d432c7e1af2d1d9b3d217109ce9

            SHA1

            d563545fab1d511f82bbe69c6eeddc20144a4df5

            SHA256

            b3cdb98f54ddd9754b6553b7b6914a2f2543073982a41c5e15ec14a4f68ea0f8

            SHA512

            c3796c44c72194e7a011b7536b47ae899f373af18eceef632662073bd5c8156a0014cdd673984103bb478385e36d9018656de6eb5f550c167da8ed2415266455

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            134KB

            MD5

            2019304045626d7fb3b549ee493db083

            SHA1

            b193f0ff08ab3c0b453b856ae9e1437f9536b247

            SHA256

            15e7173a479d16baf8f393306d01ed69253712e264be71032ddbf8e1f3a7adc4

            SHA512

            3fd5ba8ad2e71498125a58945d0027afec0752926d83adb6a0c3908f21f0902099c0da4cde3efd693afc19456466f5d8b1d41d02a23e0b60a675a473aebd8b60

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            134KB

            MD5

            ac963a5489dc6d6c5f8dba2f504d87a5

            SHA1

            e7a13b49b6439b7353d4a5524ff1cb572eb5cf85

            SHA256

            217e47e3ea0c2ab50e12522bf9978b0999e991faf996724cae4fd4ad45df2ebd

            SHA512

            521ac1c956ab3cf6c7d89f3a82e3d984a4008b4470fe712a6c0c4eee08b569271f6bed221435a46c94825bce8295fd0ca68850f4cd3941b14ace468b1ddcba8a

          • memory/212-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/212-17-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/212-30-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/212-24-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/212-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/212-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/212-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1252-35-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1252-41-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1252-36-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1680-16-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/1680-0-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2376-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2376-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2376-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2376-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2576-43-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/3780-11-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4412-31-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4412-49-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4992-48-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4992-47-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4992-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4992-53-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB