Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2025 11:06

General

  • Target

    fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe

  • Size

    88KB

  • MD5

    089bc9c981a81ab3357819a123e11bf0

  • SHA1

    387367183e3447e5bc9cb0cb05fd59cbe7631baf

  • SHA256

    fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362

  • SHA512

    74938d6acf14e1f50f1d254e5de8dc19af4559b7cd11ee0a8a8e00a2ac488656862bcee8f931295febbc6476fe53718beccaf9f87a96a2ee0b2b4b7bae509209

  • SSDEEP

    1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5h:RdseIOMEZEyFjEOFqTiQm5l/5h

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
    "C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    88KB

    MD5

    6274ecdc91c6bbd397d93bb6a5ceb6a4

    SHA1

    3316484db852f34636a6bca9f7bb8aeebe46cba3

    SHA256

    5b8d5b0e4f89163c1e179e426d66587fbeef7b6bcdfba25c084a26b117cbad1f

    SHA512

    79e71c9f6b5aa7637750c2f6d3172359f8caf4fa2f0e5bedf0ca9d2233c72f5695f17a5c6567f689df0daf101bc190ca88c94763cbe9ffe6dea3f9de481fc144

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    88KB

    MD5

    0b0ac4ed117f89bda16d097d194a014c

    SHA1

    596fadba308f36b0fb6e248f334db4f2edb3077e

    SHA256

    2b6ed447e84811a52106abc259ba7ea6bfb6338f13f9d9f551ede751f5c40e8f

    SHA512

    3543199ca870dd5491aefbd62bf9c16cf638ac0a679c21d33db61b1bd2f0af9f55fe0827345a00b0be750e43e29efa775e140a21dce5a13dae3439276a265f4e