Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 10:52

General

  • Target

    fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe

  • Size

    88KB

  • MD5

    089bc9c981a81ab3357819a123e11bf0

  • SHA1

    387367183e3447e5bc9cb0cb05fd59cbe7631baf

  • SHA256

    fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362

  • SHA512

    74938d6acf14e1f50f1d254e5de8dc19af4559b7cd11ee0a8a8e00a2ac488656862bcee8f931295febbc6476fe53718beccaf9f87a96a2ee0b2b4b7bae509209

  • SSDEEP

    1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5h:RdseIOMEZEyFjEOFqTiQm5l/5h

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
    "C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3904
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    88KB

    MD5

    f3c1922a11d56690e7d521c278c54975

    SHA1

    2625a421897ec0eaf3dbc2906919f94ca9cc9aa1

    SHA256

    9b4904324b5943632408e757ebfcfb7958d66590871e21d08669eb837b105b4f

    SHA512

    d5f51e69c1702b1c333807c9ded332a3742fcb9a0184192f9af81607d5c194937da1381eaa8eeb8e3a6a1fb58293429ea1b7d732bddc0ab2b6bcf38a4b535acf

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    88KB

    MD5

    6274ecdc91c6bbd397d93bb6a5ceb6a4

    SHA1

    3316484db852f34636a6bca9f7bb8aeebe46cba3

    SHA256

    5b8d5b0e4f89163c1e179e426d66587fbeef7b6bcdfba25c084a26b117cbad1f

    SHA512

    79e71c9f6b5aa7637750c2f6d3172359f8caf4fa2f0e5bedf0ca9d2233c72f5695f17a5c6567f689df0daf101bc190ca88c94763cbe9ffe6dea3f9de481fc144

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    88KB

    MD5

    c5c0e7a89aa7c5aa6a696c75b5ae467c

    SHA1

    38a85223a8d44d23dc31a78b28fb473a65bfbb43

    SHA256

    521bee37118b3974b8926437a0fcf9e3efbb7e42ed7c2f30603121b1d6aa1656

    SHA512

    63642930555d50592433b0d5c74a8d539741d11745f5e4e932b208a220e6adb015e7605d5cf119f77fa8f37c2316cdbdde782156c48bfad254c7a7a0f58db3b0