Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 21:21

General

  • Target

    1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe

  • Size

    71KB

  • MD5

    59a8c47d53f2ac3614624307d509b36c

  • SHA1

    a832daf4677363d58130efedade6ae57ea54f042

  • SHA256

    1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266

  • SHA512

    80d9d7a03444bd38187a26b84280306b5e33d71792d8aa4b3e1a3c9a9e36dc5879fed294eb09359d18fe073c3f947eaeb9bb9ddeffc128ce7854f1c3ea572c46

  • SSDEEP

    1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHX:7dseIOMEZEyFjEOFqTiQmQDHIbHX

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe
    "C:\Users\Admin\AppData\Local\Temp\1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:3288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    71KB

    MD5

    a3275f16a6a42e080f686c1877e8b568

    SHA1

    8b30b39b0274d42d178efc5ac5276ba632e0822e

    SHA256

    18a148eb2bbe44f0244a9f7bc244c258aa996e5d2afeac0c098c8fe58b45d52f

    SHA512

    104ad482cca5ea483ec90f2e0f8982fe9f41f76c89e7c692144efab1e5753865cf93aeace0f358ff0a1f7f420a10e594cf7e09228e0143570004c6b2d5948648

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    71KB

    MD5

    e66fc731ec27cb9616f9d6dd3958b236

    SHA1

    2e62579090454de107347b740364cb2dc3d7d162

    SHA256

    e88bf8c10593028f4cf219a1c19c03299e4ceded10aecdee2962b35b831f4893

    SHA512

    91b50a849aa0e99896e0ac148a99476ddc2886959f9fd29011fb01ea5742700460d278399505c64b3a0604b8663c0ef558646bd4ed9ea7bf327753d048a516e1

  • memory/2896-4-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2896-7-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2896-13-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3288-11-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3288-14-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3512-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3512-6-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB