Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 11:06

General

  • Target

    fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe

  • Size

    88KB

  • MD5

    089bc9c981a81ab3357819a123e11bf0

  • SHA1

    387367183e3447e5bc9cb0cb05fd59cbe7631baf

  • SHA256

    fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362

  • SHA512

    74938d6acf14e1f50f1d254e5de8dc19af4559b7cd11ee0a8a8e00a2ac488656862bcee8f931295febbc6476fe53718beccaf9f87a96a2ee0b2b4b7bae509209

  • SSDEEP

    1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5h:RdseIOMEZEyFjEOFqTiQm5l/5h

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
    "C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    88KB

    MD5

    6274ecdc91c6bbd397d93bb6a5ceb6a4

    SHA1

    3316484db852f34636a6bca9f7bb8aeebe46cba3

    SHA256

    5b8d5b0e4f89163c1e179e426d66587fbeef7b6bcdfba25c084a26b117cbad1f

    SHA512

    79e71c9f6b5aa7637750c2f6d3172359f8caf4fa2f0e5bedf0ca9d2233c72f5695f17a5c6567f689df0daf101bc190ca88c94763cbe9ffe6dea3f9de481fc144

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    88KB

    MD5

    7f32243678c69fb357d74e40a5fc99a4

    SHA1

    283ebba04557929baefa8315e0f4191a4392d6c0

    SHA256

    32cd0e401305f9accdbd96da8382055e20251a928c87b2de2b7c8fface0b7fa9

    SHA512

    f3c57a5f5a4dfd3b3ace5a9985651cf167e9205c1c364bc8d49ed79ae5b36b60480f30d8d515c5515134fbc698674dd2f6900f19ed411f232b8a0df4f3932f48