Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 11:47

General

  • Target

    b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe

  • Size

    80KB

  • MD5

    ea52200dbd683bc5981df0295e11fa90

  • SHA1

    61dfbd5f353534c5c7ad3b2824c1a12ce9098f9e

  • SHA256

    b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483

  • SHA512

    255555ae32d54ea6da40d6b53733984e7b1af65d1b20ce7dfd05746fbaa459ba57da43257f481e9c8727e3fc4094b4c641614a396e87a568ceb2d8ba7bebc4ef

  • SSDEEP

    768:ifMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAO:ifbIvYvZEyFKF6N4yS+AQmZTl/5m

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe
    "C:\Users\Admin\AppData\Local\Temp\b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3820
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    99920d798b3f640af318d2f6134735b4

    SHA1

    51fab2f5b2660d3f116b49c05929556b297a1b00

    SHA256

    6a22b6b28b20a7c2175442f3399328e29dd7d2365ceac30d602b3c3b13a1ef8e

    SHA512

    6c9595c351ced2ea9d5066ac8f92afc14dac77b1d2b9ac2d229bbcea306621480511ee192d771be8ba797299823f000e1f664d58611e835735d309446be23527

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    53c479dffbf0a66cb330b9092259fe2b

    SHA1

    5c5231e8c9c4c0a7652b08ca20c679cbf9465c83

    SHA256

    5cabda04807c9b12cb450a62b4f5c7378571790ed45bddabf652c992135a0379

    SHA512

    5157eaca2caf46b94d065ca045c05f34fa193d2db3860b9abacbea222339bbd50f877288c28b682f8d543be8e1d81f9a97de509f2941ec177ccd4b9ccd5a3617