Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2025 03:11

General

  • Target

    b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe

  • Size

    61KB

  • MD5

    59ada6b8a5b4b1d95057515b1872a6a3

  • SHA1

    fb1ee815d23703c8182d9f2d4209d47678201cba

  • SHA256

    b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69

  • SHA512

    3afaba73b5be8cc19a1c2ef5307af9ba8ebb5924233ba22ca8e9c3d2c302b15f0bcdab8f419151058f910144c16541f7cd1db66f5895f3d0a3c67d9412debed1

  • SSDEEP

    1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/53:edseIOMEZEyFjEOFqTiQmTl/53

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
    "C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3892
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    8f67a03ab7f2d32e1d7377cfc2e08fc3

    SHA1

    cb073edfafdc5b5f6728ee3e5cba1586b5c24352

    SHA256

    bd294858404c4370e87f4af032c3490a76ee88a2c6125623f07357b8b19c20e5

    SHA512

    df6eac7b63f9bb144348c91b8b2a750c3a568ea6bb179f78ad88ea6778df57b04f00008e8f2f898904824f1c06f38cbf627e09181adf0a52b79c868b0996b1f2

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    6353b341752d72e1d3571499437d9bef

    SHA1

    f53b39ba778dcf7c52da3f42b15128068740787e

    SHA256

    59e51d94da228aa8c60558f80760cc064c89b0f55c6b09d1d80ce2163c553510

    SHA512

    5432b91ae7f2f9e8fbaf670c01506cb117e2d1c55fdffff01ee2f0f2b097b6ae851076541278ba99ef530e4f9c8290adec26ffb0868a99b23651c79de369076d

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    183a7ece79897472e0f9b9ef43a4e710

    SHA1

    434187f9e9b96b3fa80ec99a93dbe0a2f581f7b3

    SHA256

    39c9a6135f15daf61a6c3f3eec69d618139052c186a91c7ea4c6800eef3ccdd9

    SHA512

    5b62c115c50c619982abf5a6923491154cca0f2ae69bdeebfcc08ec3f56e3c0f3d216988026825085fcff069548d01a0e095b924e27be5e87dbb545e83f7219c