Analysis

  • max time kernel
    115s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2025 23:13

General

  • Target

    0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe

  • Size

    96KB

  • MD5

    fc5a521412e14ee3f5b104f3dedadc8d

  • SHA1

    59680b4ac14161838dd50c7eb936cc63330c3b55

  • SHA256

    0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5

  • SHA512

    30d02b940b8a4f959e0aec29a6c382a6dd214a0453ee1e3c7ce83a23aeeeb1520ef4075568ac270f4ba5b0ee771475b65e96b595fa6a00495d6ae7bd14ae5812

  • SSDEEP

    1536:HnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:HGs8cd8eXlYairZYqMddH13L

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe
    "C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe
      C:\Users\Admin\AppData\Local\Temp\0215474b41ca890339e8a7351431af4a63a8240e8ab63ef45bf28099715ff7a5.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2264
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2384
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1048
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1860
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    96KB

    MD5

    5426ac3522d36db2f82844fe2b686018

    SHA1

    bf4da61b45f2e0f084d21b423d59364bf79ce082

    SHA256

    f6ef8b48f1e7dad6453cfbe679899863d8cad610e0280d2e2e6465af1d120efb

    SHA512

    e11d5ac86cd699c7ad2b8d0acfce64f681ff03295a81304e4a79f22507d2f44ed70d9d93f7d96107ed4b6fd19a2ef5817ba2a22bfd28efb3dd4b237441bb241e

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    96KB

    MD5

    964d7a881a43f4be73514276d5ef488c

    SHA1

    2104fb5cf7a056cd104f633c0ece5b50f600b20b

    SHA256

    318154a47ecd029c05982e2a8239f19badcf2c057af33be55daf8b5702555ede

    SHA512

    277dd506adb199ac55c2c61b7d589b25a26a22ca19f4ad8826f85f1cb5fc5e9818382e54b2804d4283bc7a68e778793459e43321d09b219edbc2b9f9460968b5

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    96KB

    MD5

    f22085ae35b7c3054796294f4d0498fe

    SHA1

    62cd6a8b6aea1c3e3bd8fc60aff38f62152d542b

    SHA256

    96946a1a537842062e55f8fd51d86c80176f80f06a66e8304b4c6f54ac59dec2

    SHA512

    b3b15a4c933454c2f4a593119f5957d2fe6de2e41c58712a2d1b66044094ebdbb725ed4d2ca9ae88c4676d0851f01d9d352d9da6ccc841fa0cf1214a3d1f0f15

  • memory/1048-74-0x00000000002D0000-0x00000000002F3000-memory.dmp

    Filesize

    140KB

  • memory/1500-35-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1500-23-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1500-26-0x00000000001C0000-0x00000000001E3000-memory.dmp

    Filesize

    140KB

  • memory/1860-89-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1860-82-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2168-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2168-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2168-13-0x0000000000230000-0x0000000000253000-memory.dmp

    Filesize

    140KB

  • memory/2168-21-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2168-20-0x0000000000230000-0x0000000000253000-memory.dmp

    Filesize

    140KB

  • memory/2168-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2168-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2264-43-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2264-46-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2264-49-0x00000000002A0000-0x00000000002C3000-memory.dmp

    Filesize

    140KB

  • memory/2264-57-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2264-38-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2264-37-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2384-59-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2384-67-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2932-92-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3036-7-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3036-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB