Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 06:02

General

  • Target

    8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe

  • Size

    80KB

  • MD5

    b4737e28abf9d45552e4aaef61991cec

  • SHA1

    4bede00959e717060da43a28715e319d1497649b

  • SHA256

    8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229

  • SHA512

    7ad8a2aee743e9fc19c5250e0edfd016a53d4be45a26a2377c114b447d8887e5c05ed3e3d36bb8befa1b587f4b6ff4ec78bac6e2fe8f20e5f0649ba3f21f3ccb

  • SSDEEP

    1536:Ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:gdseIOMEZEyFjEOFqTiQmOl/5xPvwv

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe
    "C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    ed09572d90fc14dc1262625c1724232d

    SHA1

    dd127b4cee5b83cc672b4a27cfa9ee93aa7d2736

    SHA256

    95eed64b6f01f17077eb4d878df44873aeb55bbea041d7d8ce37d63651a4c619

    SHA512

    84582265e814592929e369231c1bcc0fd6e41e14c08a08531cc839c4bdc3ab957886bb0a71344f96b3969aa53ff1e6a232aa20ba0b69aa78d1a0e07ca236e0cb

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    acb3009225c661cf942259bdf4455108

    SHA1

    4bea34d5c3335276d9df632dad29724dbbeb0546

    SHA256

    a6686bc28067a9229313b27a9e1e2873890775b7029d8254881c6307b415ddc7

    SHA512

    9298931fde3d263257e4514e082a52918c15875e22ac1a742b2ea1f5699002d9392c5e26f687f6964e94c74402c9c189d2d0729c4341de815fa5f5a27b667524