Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 06:02

General

  • Target

    8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe

  • Size

    80KB

  • MD5

    b4737e28abf9d45552e4aaef61991cec

  • SHA1

    4bede00959e717060da43a28715e319d1497649b

  • SHA256

    8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229

  • SHA512

    7ad8a2aee743e9fc19c5250e0edfd016a53d4be45a26a2377c114b447d8887e5c05ed3e3d36bb8befa1b587f4b6ff4ec78bac6e2fe8f20e5f0649ba3f21f3ccb

  • SSDEEP

    1536:Ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:gdseIOMEZEyFjEOFqTiQmOl/5xPvwv

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe
    "C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    ed09572d90fc14dc1262625c1724232d

    SHA1

    dd127b4cee5b83cc672b4a27cfa9ee93aa7d2736

    SHA256

    95eed64b6f01f17077eb4d878df44873aeb55bbea041d7d8ce37d63651a4c619

    SHA512

    84582265e814592929e369231c1bcc0fd6e41e14c08a08531cc839c4bdc3ab957886bb0a71344f96b3969aa53ff1e6a232aa20ba0b69aa78d1a0e07ca236e0cb

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    58b64b842302b1a3035f16979efa7f68

    SHA1

    4121e800325b58d79cfe0c51d0cf08a5e50eacc5

    SHA256

    23c815f671e71a8bbc9606121930b5d956f01b099ea7dbc0dc27c08536d6711b

    SHA512

    6c86380cd9b0182e4a9a98ebf74e2c717cbeab6314e01e600ede659d5eeb1bf1b84910971e5f2875c664a11865b9e4591a19c5520e47154d0f0338b7740562b5

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    d948209db82f6e1e032e3a4447cad801

    SHA1

    1a358bc0da7eef81ad7be57046e5d96bde89de45

    SHA256

    8f1673f3a2b38af849019799edfff2411434ad18759e53105145788e499297ac

    SHA512

    afc6ad6add5ccf92b096291de49606834b00f276303dc4f7885767b5156e23391136bfef38a929d2667cd6e671773ade9bdfb8fd7a2b3dcb30510f2d37fc7c75