Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 10:04

General

  • Target

    f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe

  • Size

    80KB

  • MD5

    c15d9fdf5c446b1c175a66be1ad84e25

  • SHA1

    83c24c21624667175e4c8d5cac539312c75706e0

  • SHA256

    f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36

  • SHA512

    ebfb468ddc390972b7cfd3db666b52587a64112b633aab457368d02e0881cd505627f8a14f506ede91dc06a422c7e82950fb67fa3ac0c0e3694ec325b06180bd

  • SSDEEP

    1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzb:idseIOMEZEyFjEOFqTiQmOl/5xPvw/

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe
    "C:\Users\Admin\AppData\Local\Temp\f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3232
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    6207dd7e154b89d9cba99a483b037158

    SHA1

    8b93588800064ba1c6063302bf9f20a02826f1f6

    SHA256

    b1f8646e521a3547a8e91df3835e54e28206b5099c7fe2a7aca3f4a35dccb034

    SHA512

    683c166631c9f99353c1af2090c5c0b79a57d2b89ceb69dcda77bf1c7e5cd30506428093ef0dcf885a9748ecc5d25d6dfb8be9e72771bfb67c08a549818efd20

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    3529d1fcb7c41c92a37900381618d158

    SHA1

    9a9f8cfdd6f1366e7e4866f2ce5f5f39e3d05be2

    SHA256

    deb8c3d0ac3937d9acd785511f560ef04a29bd5b664d282d47e85a28a8847f2f

    SHA512

    037899757ba1722d2e5c1c0b1c3ffaf6c9ed022186db2b1e7cbaf74504dbe4fa826a16d9604f015a78c980a7fddb0cde88a9af224a279fdee22cbd30e0e92a3f

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    82e3ff6394778954848f8c739ec6bcd0

    SHA1

    6701c70e4ec5eac9956256a02a2bfe1b42a26ff5

    SHA256

    bf63c1712f2c76496c9d555108fc4f8c68719e13bb4aa21af3298d1d716fb181

    SHA512

    330cb68c3a6927deac50124f7d731d579bf7521d6c5fd61210d98c2eb639f5b36bb685612a2f25fc7412654df53f2d34756615bd751b4001ff1ab3f2c26de400