Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-01-2025 10:55

General

  • Target

    JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe

  • Size

    68KB

  • MD5

    ff49e72ad68a412debd2d538c47914b5

  • SHA1

    4d2e6c367834f0e9cf0ee393fbf3ab2038fbf89b

  • SHA256

    ca252b3cf3a4886d723368026ab0fbb29c0a469158cedee9c74dd0c08498c9bc

  • SHA512

    c03621f31ba7591b43271d906ec7e0b97084fd442e69a3b7062ab6eec4c0f4e4d1c2585042167725eef3a07aa96f6ad1a931ccefff378bf04dbf4d56196c7998

  • SSDEEP

    1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:LdseIOMEZEyFjEOFqTiQm5l/5

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ff49e72ad68a412debd2d538c47914b5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    68KB

    MD5

    fc15fd6ac6128d30f84f164bd72f3925

    SHA1

    2162e107278a68e264bfc0c1e9b29b2b6892e29d

    SHA256

    afc861d96a7eedb2b97bc79808cebec0f1d1ec89f6a9001bdd6708e5acc98d91

    SHA512

    019c176478e42843447be88e148f3c227147c912a27cd3f37e36de35f27d1db83a9508cff2d7c4043314dcab187b08545ca1269b37f7444fe6baa327e9dfc406

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    68KB

    MD5

    b79f6456483571ff2aca632723efa77f

    SHA1

    21d01925192b661ca0a3a2089b0725d7a3846d39

    SHA256

    e4c5cf208085f8ed029eb947508c525027189981f2b6650cf991d6ba04f990b5

    SHA512

    bbc503c1d3f9d72a056bf1c859651cc75e8a797f5a82cc2965389c9e621a4b8d55363535b7882bd089224b500ea870909b2a9a58641f739cab3e630f9ef98e88

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    68KB

    MD5

    1f91c58dd90e79f6904ab1dcccc5abf6

    SHA1

    ccbe3c1894391b5969e7765e6b3f51958fcbe645

    SHA256

    85b26d1d4362eb2aaeca9d735482c6595df97f06110682f254cb13197fe27896

    SHA512

    88cbebd1c2d30f4c007d6e7bf7f243791b95533bf9f5e44a2f7570a6bf719949fafacbcf4a402360c74cec81689c40c4e27e3f80aa7f505c08a3b3782358c193