Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 22:01

General

  • Target

    981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe

  • Size

    61KB

  • MD5

    1d429541a12776cd14dff027a4dbd4ff

  • SHA1

    ccfc261cb2cd7e534957f8f90c1d6869a4ac3cd5

  • SHA256

    981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9

  • SHA512

    05c1ebaa68292a96ac52e4ede6524b1c3907d72e81c479bf842b0222bb30a5413ec3aef53eacbc3b389a24c57041d715876e326626c117dea59340dd069a7f37

  • SSDEEP

    1536:ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZll/5/:GdseIOMEZEyFjEOFqTiQmPl/5/

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe
    "C:\Users\Admin\AppData\Local\Temp\981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3048
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    62a1de0ab68e289ed6c5e6e39f79ab4e

    SHA1

    92dbb49e36eb3c32de2bbed45412258e3d5422ab

    SHA256

    afa7b5a6326712c5cb5dfda7aa0a9bc2586820977316f47700d73e9d525e1514

    SHA512

    f23a2d444ae79ded95571562371a744ae0eaf42f4db3f22213d0ffe429061cc8b3c57bf7099ae838d62eb27e3a625c535763ea5e2f1d7d845c3deca4e29f23f6

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    61KB

    MD5

    34902e65c60cccd1554a3baef05498d3

    SHA1

    311e84ed7f8c034b5a630f27c4ac2bef8b1140ed

    SHA256

    bc87954449a27bb9b64ad744a634ef31608d96c0346cab6f4b2fc6f33e654995

    SHA512

    9e195766a6ac858056b3fdfe63029abe425f8f39aa45df56320a006e5a3f6dae9ab676073abb3a2ec3edf4720fa455f7ec6df68897b5202b060a2c15e50f142d

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    61KB

    MD5

    3111bcf9bf3d9e8d4a1daa42c6778f22

    SHA1

    c84d2fa7860488d504312fb36bfaa6dc95cacc0e

    SHA256

    586839fdd752495d9637fc1aa4278a190cf7c8056899b379aa49376038b51a05

    SHA512

    5076317db6f8517ae03232d0d7d305ee0eedb5b755f0de016d9a2bf9f2c384171936baae5efbcabc17d5b0cd76e2dbeda86357af7e0961916d835e498b54766a