Analysis

  • max time kernel
    115s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 07:02

General

  • Target

    6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe

  • Size

    96KB

  • MD5

    6d3dc9d6bd7adee40728b253e2eb0780

  • SHA1

    a86a05578acb4d0627f7d85af8a39433da702194

  • SHA256

    6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147b

  • SHA512

    bf635ffe96a0b02ed884ad962d023f204bbe1d7a33fddc951cf1fcd34b7abc304ca5345287dd823c5413944433b3a14a358307fd0829dc29f3fe768e2fc48357

  • SSDEEP

    1536:4nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:4Gs8cd8eXlYairZYqMddH13r

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe
    "C:\Users\Admin\AppData\Local\Temp\6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Users\Admin\AppData\Local\Temp\6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe
      C:\Users\Admin\AppData\Local\Temp\6c5293e8be1df26d6f15895e22a9b6b79d33ab9984fb7598fedc9337ab24147bN.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3236
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4480
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4248
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2404
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3628
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2436
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4496
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 260
                  8⤵
                  • Program crash
                  PID:2440
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 292
              6⤵
              • Program crash
              PID:1856
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 300
          4⤵
          • Program crash
          PID:2076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 288
      2⤵
      • Program crash
      PID:4680
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4836 -ip 4836
    1⤵
      PID:3204
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4480 -ip 4480
      1⤵
        PID:1488
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2404 -ip 2404
        1⤵
          PID:2268
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2436 -ip 2436
          1⤵
            PID:1808

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            38d50e91825b4feac22944d34fe693bf

            SHA1

            d60f928b37f28416b603122716e986abf310cece

            SHA256

            16bf9cea5e82763db66e7724da8afe663d5f0f6ea00ca2a8666e69888421c06d

            SHA512

            81a65315b40bf79bc66cb8eb383a9c5c7ac7a90887fdac66299a6366f6890a2292ce9ef986134a449d96ce2611e86ad8ae6ce9c7369c54bb4223d4e8a31a2b3d

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            df24be91929341411994d9c5d5df22c9

            SHA1

            c947478174e353d33dad3244fc79ddae1be3e703

            SHA256

            bb5f489b34c4001feae77f356975ffe2007b2c566820753122ced0ffc504a268

            SHA512

            088f54fd412db3564f1be4e0ce79ad305cee6cae65ef3e65dcc3aa003927e0ddecf99326f789fb199988de5428eb0f4d451bc0cec1d82f417a61e148ea3c54ec

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            cf6b7fcae2d195eb650ee306209ffce8

            SHA1

            a8ff851ea5e3ead1b98d1a670da91b3cc44be666

            SHA256

            7b1112f84dc49ea721b01c9e4f47114b993c4b65c0be981c47f0dc9220641353

            SHA512

            b93d284a03a77aba73b98672e0ccbc325772b4e0618785afe5c474fc3bc0bc0d804778a71b267dc68859683ea6d0aedef9f160cbc573d756d1f6cc779233c8c4

          • memory/2404-51-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2404-32-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2436-44-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3236-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3236-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3236-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3236-10-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3628-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3628-36-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3628-39-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4248-21-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4248-24-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4248-25-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4248-18-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4248-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4248-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4248-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4480-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4480-11-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4496-48-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4496-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4496-53-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4836-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4836-16-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB