Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2025 08:25

General

  • Target

    1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe

  • Size

    96KB

  • MD5

    de08d653fa129b10cd40b2b869573be8

  • SHA1

    2164c63aced87d14e6544bd63cf79f4d2f5d4aca

  • SHA256

    1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5

  • SHA512

    06bb45bfe88c50892fc2b23faf9ddb22a211378dda508a6fee2a6561ce864ee08a7a187b34839f69a4e3b965f9b9d9c896b312245fd8d60368e6659e178bfd66

  • SSDEEP

    1536:NnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:NGs8cd8eXlYairZYqMddH13R

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe
    "C:\Users\Admin\AppData\Local\Temp\1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe
      C:\Users\Admin\AppData\Local\Temp\1863f8ffd273a7d21d813c004bbee88e27ceed12faba042880bd1bb72a3b14d5.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:772
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:408
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2776
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2804
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3852
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1648
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 244
                  8⤵
                  • Program crash
                  PID:2704
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 312
              6⤵
              • Program crash
              PID:2008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 300
          4⤵
          • Program crash
          PID:2664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 300
      2⤵
      • Program crash
      PID:2348
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2364 -ip 2364
    1⤵
      PID:4744
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 772 -ip 772
      1⤵
        PID:1976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2776 -ip 2776
        1⤵
          PID:4600
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3852 -ip 3852
          1⤵
            PID:1564

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            514fcf52ac21b819499e4936b2a2998a

            SHA1

            72b40a50175ec7f3f011284de2daca8821789e3b

            SHA256

            28861112f2b202751719202ed433edab9ec847c2be485173a12aa6089dbaafe0

            SHA512

            2f0489af43cc6154de5c6f02e9052c2f315a4617fc7bed481191eb6e4033ae6ee8e9e74a96ea80ea17625fb353d51f30d49b7694178f618d6a8bb1730cb4e7d8

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            fdce8879327ace3e78a5b3d507032650

            SHA1

            0fed7aa14e8ee03a80b20bd6948d230e1127a550

            SHA256

            75389f80b36d5d36ff5f6f1cb2ab9436dad0ceace924191551c5d0feac620de5

            SHA512

            30bfd31a7a8e7a64dbdeae3592529fcd8ced241268d027f0f47765deaf128f031c86b2d7d335844b3791df446462760ce04cf9679d4b5b2f21f6e855d6be6f48

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            2c6b1b06d646bc804b2988ee8d66e671

            SHA1

            8c34720ea5a91482dbf3c1c821f04c4e48c3b990

            SHA256

            7bf5545c690b9ac37bb50d2280d10afb940bbf7a1507149806335cfe257af6a8

            SHA512

            6c65d2c9a20a59104a99003371fa46669a7fb693553ebb900634106581d1dbdd2dc60a92f369d0ed52f52305865ccb17cae51343a7ab045467c5c40773f64338

          • memory/216-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/216-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/216-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/216-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/408-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/408-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/408-19-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/408-22-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/408-25-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/408-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/408-30-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/772-11-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/772-18-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1648-48-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1648-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1648-53-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2364-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2364-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2776-31-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2776-51-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2804-36-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2804-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2804-39-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3852-44-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3852-52-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB