Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 21:21

General

  • Target

    1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe

  • Size

    71KB

  • MD5

    59a8c47d53f2ac3614624307d509b36c

  • SHA1

    a832daf4677363d58130efedade6ae57ea54f042

  • SHA256

    1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266

  • SHA512

    80d9d7a03444bd38187a26b84280306b5e33d71792d8aa4b3e1a3c9a9e36dc5879fed294eb09359d18fe073c3f947eaeb9bb9ddeffc128ce7854f1c3ea572c46

  • SSDEEP

    1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHX:7dseIOMEZEyFjEOFqTiQmQDHIbHX

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe
    "C:\Users\Admin\AppData\Local\Temp\1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3044
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    a3275f16a6a42e080f686c1877e8b568

    SHA1

    8b30b39b0274d42d178efc5ac5276ba632e0822e

    SHA256

    18a148eb2bbe44f0244a9f7bc244c258aa996e5d2afeac0c098c8fe58b45d52f

    SHA512

    104ad482cca5ea483ec90f2e0f8982fe9f41f76c89e7c692144efab1e5753865cf93aeace0f358ff0a1f7f420a10e594cf7e09228e0143570004c6b2d5948648

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    861aa70ab872abdd3243d263431b3165

    SHA1

    cbee1486ed80885cb8731bbee7fdeb07b800feb4

    SHA256

    b3f280f5d70bfd37caca1efe27614254a859784686136b97846ce33f0d9c25ab

    SHA512

    db34435d58138407e850873b5dd64fbf76a2ac94e3f142c2c7bf4aeee838591771c49b8d7a70b6e4c8cd7b46dcd351022707265d868dbca15968a237a2cec034

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    600afbbf8dd4e62cd74f003cc280ff1b

    SHA1

    a83905203eb4608cdc56d57d4b241c1d9742cc15

    SHA256

    6352ae491f8dfb84b380efa19302870adc024ae9a17908c8fc3bc84ac6966f49

    SHA512

    8de15683076e7501d506481bf4cd4e8e61afe8280e09a01e3e24526a1130616f9e0d5b701da64f2e444e99c363ddad65dadd73151222a27e5e504622b116890d

  • memory/2396-8-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2396-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2716-17-0x0000000000440000-0x000000000046B000-memory.dmp

    Filesize

    172KB

  • memory/2716-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2716-23-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2716-10-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3024-36-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3024-38-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3044-29-0x0000000000220000-0x000000000024B000-memory.dmp

    Filesize

    172KB

  • memory/3044-35-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB