Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 10:19

General

  • Target

    fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe

  • Size

    90KB

  • MD5

    d6751aa4248926f54bc9588bc65e4a1c

  • SHA1

    3715e109a6275482254c3f0913eda579110466be

  • SHA256

    fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629

  • SHA512

    1a97366ab41e8ad1a13396eb95d6018487f90f2fab668dd3cfe9263a807de6154cc6e12b6c5bfbea481825087ea639dcc4695ea3bb38028e7a39d214c62af2b4

  • SSDEEP

    768:FMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA+:FbIvYvZEyFKF6N4aS5AQmZTl/5W

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe
    "C:\Users\Admin\AppData\Local\Temp\fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    90KB

    MD5

    7d3a37876afdb630ef3e8d18bace8aec

    SHA1

    0d4d8887804aa168bca57e0842fe7df2752a21fc

    SHA256

    240ac3b87a133772d045e0de7096db649ea1a7c6dfc849cdfa0ae0a7e4f95e6c

    SHA512

    77464004e1541de33a738956757c2b9622f2221d5712ec0349339cfaea13a2c6debb7241f96a6f5a3c7a83d2994bd652cf02213c5a2484e53545605c321044e1

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    90KB

    MD5

    d82eec30921e57514fb3fdf79f835595

    SHA1

    54fef225430632f5aa79d8ebe61696b3b206faf4

    SHA256

    a311c74ff77d96dd22598bb99c274a32e065b1abff4ed6fc4f37032c90f4cf82

    SHA512

    d0a639a384bfb523809482b78557618f40296a219edcc1fbd030b42753d204da9d1b1e8c0b049d7e7128c47fce8e9352bcd66628470dfc8378c2b2b9cdc7ede7

  • memory/548-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/548-14-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1788-5-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1788-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1788-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3644-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3644-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB