Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 06:08

General

  • Target

    8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe

  • Size

    80KB

  • MD5

    b4737e28abf9d45552e4aaef61991cec

  • SHA1

    4bede00959e717060da43a28715e319d1497649b

  • SHA256

    8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229

  • SHA512

    7ad8a2aee743e9fc19c5250e0edfd016a53d4be45a26a2377c114b447d8887e5c05ed3e3d36bb8befa1b587f4b6ff4ec78bac6e2fe8f20e5f0649ba3f21f3ccb

  • SSDEEP

    1536:Ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:gdseIOMEZEyFjEOFqTiQmOl/5xPvwv

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe
    "C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    ed09572d90fc14dc1262625c1724232d

    SHA1

    dd127b4cee5b83cc672b4a27cfa9ee93aa7d2736

    SHA256

    95eed64b6f01f17077eb4d878df44873aeb55bbea041d7d8ce37d63651a4c619

    SHA512

    84582265e814592929e369231c1bcc0fd6e41e14c08a08531cc839c4bdc3ab957886bb0a71344f96b3969aa53ff1e6a232aa20ba0b69aa78d1a0e07ca236e0cb

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    0dcf26c4e7fed26ef7427986f485bb0a

    SHA1

    087f37368207c77e57d0f3fc440ff50dae19d9e4

    SHA256

    60c3345fbed5c0c03d8cb388b4644ea4d9347156ffa220ee5829eba8b42ea741

    SHA512

    db7e5512a0c768564cc3c879a5fa116c267b6b7244f9847402fe3b1cb1172717ba38bbf29aea743bdd8075543d6b9ae2d15bf2d6a40fcebc0c331404c3d678f9

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    f107b54f8aed02a1597e8d5574458aa4

    SHA1

    b20d2da2e3971cfa696b4b96651bdc660812b196

    SHA256

    28b3685eb288955f9a95c4ca721f2d70a21f01fac0ed7f5283f6d2c4da498b97

    SHA512

    e29b4cf18f213c73c5e3493bce2fe02792b5b2ef09872d58cb0cd61c13b9e56c6c08380a1502e3794a5230da2dc68b289a0cfcb184a2f055ab6c046afd5eb78f