Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 00:25

General

  • Target

    052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe

  • Size

    96KB

  • MD5

    58d33f08933a68fe8dfd857b5bd6434f

  • SHA1

    601fa23dc75c0299947078f922a0cbe01873c7b8

  • SHA256

    052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06

  • SHA512

    dc84bcbf573b6688593f0de80d606c461aef94d276a1fb50f7c6ce10f6af0a851568798de2e41112988d8d22c255c62b0dfe770a75884d2ca7a61f945ec1fc9e

  • SSDEEP

    1536:EnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx5:EGs8cd8eXlYairZYqMddH135

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
    "C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
      C:\Users\Admin\AppData\Local\Temp\052ef64189e37ac9f33da3c6e411a866343eb8a944c5db25e29d97e75f32ce06.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1188
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3776
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2068
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2044
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3252
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 256
                  8⤵
                  • Program crash
                  PID:3104
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 292
              6⤵
              • Program crash
              PID:4936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 288
          4⤵
          • Program crash
          PID:2044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 292
      2⤵
      • Program crash
      PID:2376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3204 -ip 3204
    1⤵
      PID:4384
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2832 -ip 2832
      1⤵
        PID:4536
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3776 -ip 3776
        1⤵
          PID:4468
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2044 -ip 2044
          1⤵
            PID:1376

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            04e44493ed919f309eb9765da15b8163

            SHA1

            b3bb70e8bf85255f585a01dba7bc7a317d76307a

            SHA256

            9cad8fca8f3d6992128a01cb84e2a594edf8efc839268cd96b33cd6e1ad2619b

            SHA512

            fb5bc21d84df5926acd40f095bd96959135f182823c579fae06ab0d5ad5b42f8a0eb2f1868c7afb68f8bf014f6b97498ed8c504bbec446644e10c78876169408

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            b79b4b851d75cc547408d23a662cccf6

            SHA1

            4c275aa8e600d098cb301147242d41df701e1967

            SHA256

            10d7e69ba2de5d19f76e24f3d9a4c5e603f4d7ff9d4c72b2fbf81d9748b6f3fd

            SHA512

            327d88440f6a916ce482c069b0710c034055d922e02df5d57448a14b2573df43e91268efdee925127dafdb60daa911993856a6ce58b453dfc9e3fe5da84aed55

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            d8d413d47dc7ce704c7ea0d673037a3b

            SHA1

            7ef1ebde3257df017f550317ae1de13865f49136

            SHA256

            1cefe13aaa1b4f7d432bf9ef59861cfa8e8499d293f363dfb25c7414d1c31925

            SHA512

            3b81fb4b5cc3da3f7c3cc0107548e80bec5b84312294f35630581b0cf7661aa74bdf07f6ec7d163b1f4c1e799666fedff6c0216035007b31fb280d633a50e072

          • memory/1188-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1188-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1188-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1188-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1188-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1188-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1188-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1208-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1208-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1208-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1208-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2044-44-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2044-53-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2068-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2068-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2068-40-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2832-10-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2832-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3204-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3204-19-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3252-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3252-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3252-54-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3252-57-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3776-52-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3776-33-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB