Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 03:08

General

  • Target

    b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe

  • Size

    61KB

  • MD5

    59ada6b8a5b4b1d95057515b1872a6a3

  • SHA1

    fb1ee815d23703c8182d9f2d4209d47678201cba

  • SHA256

    b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69

  • SHA512

    3afaba73b5be8cc19a1c2ef5307af9ba8ebb5924233ba22ca8e9c3d2c302b15f0bcdab8f419151058f910144c16541f7cd1db66f5895f3d0a3c67d9412debed1

  • SSDEEP

    1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/53:edseIOMEZEyFjEOFqTiQmTl/53

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
    "C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:4964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    6353b341752d72e1d3571499437d9bef

    SHA1

    f53b39ba778dcf7c52da3f42b15128068740787e

    SHA256

    59e51d94da228aa8c60558f80760cc064c89b0f55c6b09d1d80ce2163c553510

    SHA512

    5432b91ae7f2f9e8fbaf670c01506cb117e2d1c55fdffff01ee2f0f2b097b6ae851076541278ba99ef530e4f9c8290adec26ffb0868a99b23651c79de369076d

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    0634e482c9905d4eef3bc02b30059936

    SHA1

    e6f6d25851dc670ad15f2a40d2aac5208ae5f447

    SHA256

    9684154f3bd287b657778a537e6a0894e4ca9a51a74e1d69e0d97325ed9f0720

    SHA512

    97d56b043305523192ae6c0cf8359bdff2af43a18e93d387bc18277a4aee5ea176e58c9cf209c2df2df52b01918df82b66fb51b38a9b78a759bd450012c8786f