Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 06:08

General

  • Target

    8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe

  • Size

    80KB

  • MD5

    b4737e28abf9d45552e4aaef61991cec

  • SHA1

    4bede00959e717060da43a28715e319d1497649b

  • SHA256

    8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229

  • SHA512

    7ad8a2aee743e9fc19c5250e0edfd016a53d4be45a26a2377c114b447d8887e5c05ed3e3d36bb8befa1b587f4b6ff4ec78bac6e2fe8f20e5f0649ba3f21f3ccb

  • SSDEEP

    1536:Ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:gdseIOMEZEyFjEOFqTiQmOl/5xPvwv

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe
    "C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    ed09572d90fc14dc1262625c1724232d

    SHA1

    dd127b4cee5b83cc672b4a27cfa9ee93aa7d2736

    SHA256

    95eed64b6f01f17077eb4d878df44873aeb55bbea041d7d8ce37d63651a4c619

    SHA512

    84582265e814592929e369231c1bcc0fd6e41e14c08a08531cc839c4bdc3ab957886bb0a71344f96b3969aa53ff1e6a232aa20ba0b69aa78d1a0e07ca236e0cb

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    0dbda79d8acfdbb1d3988e179826d3cb

    SHA1

    8ae3b5f2cca0dfbb0d83f2518212388f5638e88b

    SHA256

    eb946a1cca329e7eacaa4c9ef8d9a456a3febf12f16007f4083381bbfef6b2b8

    SHA512

    b8942c612b1c19e02e2f5e47f27b307c61aa9ff295dafe6b5b66c9fb872b7363953f473ea4608002cfe4675c602910f2fd56e07fa66aeb7fdba679a450d88010