Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 07:38

General

  • Target

    c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe

  • Size

    89KB

  • MD5

    74e3d8a305751a63ac4b15e00fc256f8

  • SHA1

    e98f0a50e1b7017270537a1262a76a353be283fd

  • SHA256

    c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426

  • SHA512

    decf2cc0505f0c26c5408b3b8cfec436c97869ad33e58fe5d9e4d9ceea4b761c3a3414fde0c85e7b8491d4c54b3109b87806672b82fc1c165e5ce680aa6118ea

  • SSDEEP

    768:tMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA1:tbIvYvZEyFKF6N4yS+AQmZTl/5d

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe
    "C:\Users\Admin\AppData\Local\Temp\c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    89KB

    MD5

    d6b8e6dc9df48671f1169b1c867fa185

    SHA1

    f81da4fc3038388200fd01cd91d2d8541b995724

    SHA256

    7fc929bdd750bb0068f596c7a5f95e4a75870f7d9b0603315071fad58b4a963e

    SHA512

    32ba1351adf71ef7c71e5e8f15838ed863898a5d519a520491508099f0f3ff4591fb0b1cd3ed1c3ccb6c44975f45a9b5e08116f70cab3f4433b9195a63bdcbe5

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    89KB

    MD5

    740ba1cdc833a7d05fa8b6fdb730fb49

    SHA1

    c85e617bd16fe47ca4c494e5496c063ff215cf07

    SHA256

    3cd825d40f7a4ef38a0f30f5fab4202f259fddc36b6dfa6adacc52f369b8aef2

    SHA512

    b787ee126cb1907931f85b83808f9b16a096704a9ea391d634d72f416cdd571904978a02272fe9125bb89ba8bbeb2ff71a63843fbe39ef2a66921eccb7201e58

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    89KB

    MD5

    c55939ca6fa85d71b4a1f0dcee67ea5f

    SHA1

    7124061f24ea649ed1069850ce8f227c9acb57d7

    SHA256

    363073087225194427a5bbb9b09ae3d3bdd9d27db6feeea8ca25528d95f647e9

    SHA512

    664aa9cb31fbfffb97793eb3246f928780c68ff9d535a7070f4d0e4ab9bb4bed6d4d74beaab91a2b6ca912dd2c551fa03e75e33e308f1c04e209b240b2fe5755