Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2025 15:29

General

  • Target

    33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe

  • Size

    76KB

  • MD5

    0c1a28fac6dae204a0b3fef41653590d

  • SHA1

    651bf9bc7ff22bf654749fe299fc2a5d436da11f

  • SHA256

    33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9

  • SHA512

    8d3f833a226ae3993291f701c8d647243ddbbbb4e4dd128f11741315fb61bda0c072e339aa1c48a21ed3b25a7914d9b5094fd844c145a8e320a1439617f99765

  • SSDEEP

    768:p2MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWR:kbIvYvZEyFKF6N4yS+AQmZTl/5OR

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe
    "C:\Users\Admin\AppData\Local\Temp\33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    093a6b45f5134ba6922013bfbca4ee93

    SHA1

    21fa4b285805fd4a1f499e35e4c034c24f5edeb6

    SHA256

    2253a95c8316585e8579189a602d0f96056a2c566e742123a47551022fe3169c

    SHA512

    43f5d5018e11f5113730313d08db04976717c782cc72838fc2d47f0d7038c3e3d7c37c8bbef7f3103f6539dadf00e51521540542586867c48e79506251734de1

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    adeba10e77430d7e008667a3e80522ad

    SHA1

    82bfc54cd19405f6ca615e3b3381b7157c4264dc

    SHA256

    dbf49fe5d56689c32c4e49f530b9a7ff1a06fd1e40666d7c9c18a0f21e7b9af6

    SHA512

    ea83d3b6f255c12f6daaf46528e61e9bc65bd4daf5670b75038105981ba6d0ca53ca8d0e42e54fe0891b6f231316e92dabc5cf0cc7e7f8841d69edd97bf5e39f

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    1f0185522001158beae0c1a0b0d31f8f

    SHA1

    573829d1f7f5776debe0798c996f303838083e55

    SHA256

    da11df9fc43ac8ba2f923711104fd6467174111ae1146ff590387b8a84b426ac

    SHA512

    fc37b9a57832879139e85cbd621308fdea151ac0338a24f06048692ee36744fb7cc6afb82e1fb4b150c85d55ec9d014dceb13d1add505ec5816ee3ae2f00f743