Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 13:07

General

  • Target

    df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe

  • Size

    72KB

  • MD5

    ab4f61fef0ff7358cbfffaf022324ce5

  • SHA1

    300c6c788cc3bc1a9eaf268679a37033dba7771a

  • SHA256

    df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df

  • SHA512

    79ac1e5bbfc8eb7ea87984934af4beca0cd1c03794802aecd621c83633780b6ed118c8c434667c736cf5d82b8615cace4de636ee7b72dfff6fe5d7fbee8d59c0

  • SSDEEP

    1536:rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211N:bdseIOMEZEyFjEOFqTiQm5l/5211N

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe
    "C:\Users\Admin\AppData\Local\Temp\df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    72KB

    MD5

    51719922ea0a2797859e18285458f816

    SHA1

    23ad62e8d96b47b133e2982f2814b9ee44afca36

    SHA256

    ed98b469a145894e00d39ec14bc7a182c14cb31aa38fec217690c300c79acbe7

    SHA512

    9d88e5faaa8bbf9898b262d5eaf48f39cabffc73d258390a4688862662e237d4d4887a68fb0035b846c9592fe3989a60de9dc4e305b640ceebb772b44a16c887

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    72KB

    MD5

    0dc4f7461919ef9929cafe4e1e34cd4f

    SHA1

    907cb7c9edecdb575f8ce90ad272afe2b056916f

    SHA256

    a31bab4ed3fce599e58947a62b468fd4915b539a2a08c05db8241dbf26ac1e4b

    SHA512

    3d2f1d4b8e1790419f555998dd52bbeb9787db3e33fde509fbc9f176628d5793cd42a7a4d6bf55166489ae540f8f76c789c33fee3970f8e25d5a8ff5bb8a984d