Analysis

  • max time kernel
    115s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 15:20

General

  • Target

    ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe

  • Size

    80KB

  • MD5

    da076b2ed075a780af25e7c8c523a56c

  • SHA1

    9f109ea722d2a1c9ba0593bf40a1557ef1fa33d4

  • SHA256

    ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a

  • SHA512

    134821e7cd856403a6ee3b4224093baec2d6c8f0de9cc1189a51d6b9c2efa578e2d1485cd1b54ef2ed89c04aaf192d07c33a93411520c79445caff5aced263fd

  • SSDEEP

    768:/fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAK:/fbIvYvZEyFKF6N4yS+AQmZTl/5S

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe
    "C:\Users\Admin\AppData\Local\Temp\ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3396
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    4930377a5451987222094d54c8bf4048

    SHA1

    364a3f18bdd62c1fb6ba18787c6255755fa2c8e4

    SHA256

    ea728b35c2db687b50470ab9b908f6f98c1b356752f9174e4a20aa6dd92b6ce4

    SHA512

    3ac22ac826fb09d85af3e4bd7b661f57eee5d22a85d77da2784ca05049c382a580b34d0f71cdae8e851b2fe2ad3b24a9944c4659037ee74d3ce07fc68dcf4496

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    8bd178539e623f608067212c277da57e

    SHA1

    836d6b6bbcd2ab42b57c7be1c7b8f3b16a1694fa

    SHA256

    abe710c256e8bb267ebd972957a76dfa4181afffb616baa7cc43b8bfbe2d3086

    SHA512

    a75ef28b019b4ca2a06bc72f3782a294c91373c3c2fe1d604b9139d356908c433a0e186d3ab791ce1e2245b6fb6b2c57aaa953650632db70cd27df73dd78d3ca