Analysis

  • max time kernel
    114s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2025 18:54

General

  • Target

    05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe

  • Size

    76KB

  • MD5

    af73dc59f5c9746496cff37edba69c50

  • SHA1

    6c90b661ad79930d25d153ed308223b31dfa6fb9

  • SHA256

    05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688

  • SHA512

    1ad188fd0165128c3eef7d694fce0b7654674169e8dba9f38103dc8114f0a422e475960179410145d3656cb70103a815c07a3c6e23c313689034f1b8246747de

  • SSDEEP

    768:VMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWZ:VbIvYvZEyFKF6N4yS+AQmZTl/5OZ

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe
    "C:\Users\Admin\AppData\Local\Temp\05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4240
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:1344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    56bd7d44e2046c42069c7700a19d1e49

    SHA1

    2f18be4ffd918125d0b6d4963b99134971db06a1

    SHA256

    632ae4ba7960c1226772d3e40370ae46e0a0d242640c3cf88c6c049d6b0a5bbe

    SHA512

    b782dcaebb3a8de0a841ef8df406b54f60eb4acc0f25d816d44825be5ff52ce97e466468e0815e4383de899d122667d4028fd67a33d66a6f8e989781284e5193

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    3e29b82d69e6d96137cb4294a1c7768c

    SHA1

    ce1984153a647eff2bcc8072bcfdfc2400ece3bb

    SHA256

    8b1e103dedb5673de16c5ffd240db18f8c7287fe046674b36c1a3bcbd97ff86b

    SHA512

    2bc266df5759c2f79ff54241dbd6b44e9f799156e22b12aba7b511e41550dd72a9614ee46e25db4c65fe73ac684f45a4b14b7fcd0f0019e6b53dff97402f259f