Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2025 10:19

General

  • Target

    fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe

  • Size

    90KB

  • MD5

    d6751aa4248926f54bc9588bc65e4a1c

  • SHA1

    3715e109a6275482254c3f0913eda579110466be

  • SHA256

    fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629

  • SHA512

    1a97366ab41e8ad1a13396eb95d6018487f90f2fab668dd3cfe9263a807de6154cc6e12b6c5bfbea481825087ea639dcc4695ea3bb38028e7a39d214c62af2b4

  • SSDEEP

    768:FMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA+:FbIvYvZEyFKF6N4aS5AQmZTl/5W

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe
    "C:\Users\Admin\AppData\Local\Temp\fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    7d3a37876afdb630ef3e8d18bace8aec

    SHA1

    0d4d8887804aa168bca57e0842fe7df2752a21fc

    SHA256

    240ac3b87a133772d045e0de7096db649ea1a7c6dfc849cdfa0ae0a7e4f95e6c

    SHA512

    77464004e1541de33a738956757c2b9622f2221d5712ec0349339cfaea13a2c6debb7241f96a6f5a3c7a83d2994bd652cf02213c5a2484e53545605c321044e1

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    54e2f1d9bce299a74aa6d5de8bc5709b

    SHA1

    074f8835ce99ad71ee2c741ba43bd9f435d6905d

    SHA256

    c535a8710a27c0b37f85e2cc4cdb25aa2f3d3b5ad9828fc7fa24219c29cdf5b3

    SHA512

    f40a40d281e01a39efaa7946f7c102c9822d01f85d45edf644eba409d8e95ef7251c0181bd95722695af014b04ddce974bea62824f9f840f2f989c5ae40e632e

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    90KB

    MD5

    4f0eb7321e0390462517c943db2f69ab

    SHA1

    e50077db889597b9686afe76f61a401a4daeae12

    SHA256

    b3618433c48572cf185014f3ce7a4aab0f4ab5ef06956599458a6bf2a6408252

    SHA512

    ee18500f5d63e16a8542843427e54bba5152619f20089c5289a268edab520832de470e92db32e0116aaa4cad76a84ad727b17ea3c23602a4665e43ae14f89a26

  • memory/1128-24-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1128-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1128-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1128-23-0x0000000002330000-0x000000000235B000-memory.dmp

    Filesize

    172KB

  • memory/1128-40-0x0000000002330000-0x000000000235B000-memory.dmp

    Filesize

    172KB

  • memory/2116-9-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2116-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2116-4-0x00000000002B0000-0x00000000002DB000-memory.dmp

    Filesize

    172KB

  • memory/2740-39-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2740-41-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2992-26-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2992-31-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/2992-38-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB