Analysis

  • max time kernel
    115s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 03:08

General

  • Target

    b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe

  • Size

    61KB

  • MD5

    59ada6b8a5b4b1d95057515b1872a6a3

  • SHA1

    fb1ee815d23703c8182d9f2d4209d47678201cba

  • SHA256

    b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69

  • SHA512

    3afaba73b5be8cc19a1c2ef5307af9ba8ebb5924233ba22ca8e9c3d2c302b15f0bcdab8f419151058f910144c16541f7cd1db66f5895f3d0a3c67d9412debed1

  • SSDEEP

    1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/53:edseIOMEZEyFjEOFqTiQmTl/53

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
    "C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    6353b341752d72e1d3571499437d9bef

    SHA1

    f53b39ba778dcf7c52da3f42b15128068740787e

    SHA256

    59e51d94da228aa8c60558f80760cc064c89b0f55c6b09d1d80ce2163c553510

    SHA512

    5432b91ae7f2f9e8fbaf670c01506cb117e2d1c55fdffff01ee2f0f2b097b6ae851076541278ba99ef530e4f9c8290adec26ffb0868a99b23651c79de369076d

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    392ed7053507b87da5812421da7a2578

    SHA1

    7888db5b7ca8bbc1851ee96c4232b81518ce7e3a

    SHA256

    995fcb6bfce554e3f11a52537e131dc429ea9bef30e68cc150712832ec85e07b

    SHA512

    245ad3841e2077e7b61501c4cda85ad8d3f2148e3f09f0e9ad1dae70e27dcfb8ad8cdaa975d54ec0489646d539a2915494ea584fececb42be50a6496c163b4f2

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    b060dbb42a37c4840161e623dc1c6fc6

    SHA1

    7834ea4aaa4f45e8019873dcd9e197bf9596dce0

    SHA256

    3c38388704a705c0a273d1343a3971338aef76cfea903c03808c13f505546bb0

    SHA512

    66568df1a68c024f3ef261c0b9f54a50093756c02c435b055ce72c37463f437790316ee3d9a3fe553c9ba701db31bd6713ea7b85bf4204a36459fe2c1293c14a