Analysis

  • max time kernel
    114s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-01-2025 01:22

General

  • Target

    42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe

  • Size

    72KB

  • MD5

    462c26d322751a036b3fca6c67ec4100

  • SHA1

    77406805b377828f901652d298c88824684320b0

  • SHA256

    42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2f

  • SHA512

    ef1e73d9808489dfc011a40d36e2de3b4642abe4000a60b552cc5cb9068982626ec2a81a720f1f4b166fa45c8c53eb2f4e4f967931340eaf93cd78e19d0b8cbd

  • SSDEEP

    1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211H:RdseIOMEZEyFjEOFqTiQm5l/5211H

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe
    "C:\Users\Admin\AppData\Local\Temp\42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    72KB

    MD5

    8979b0cf57f3afb2a76dcee8eea1d2bf

    SHA1

    7dc55aeac9dfbfa65aaa41ca4e98de17064cbdbf

    SHA256

    0a0fe481d8fb902ac6880fe1a559427bb85deefb56964edbb766e0427249ece5

    SHA512

    6b2fb8b2337811263e58ae0a47d08694ae4a2a50999d030ba33b0dd580fcba6b56ec9fea56b70b63be7c53b201c27cc39c4df095f2fa90b7b231f20fb56b9506

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    72KB

    MD5

    c8ef87cf24a9637b0d656ff0f9084600

    SHA1

    813fc86edd7c69be50d2947ac9f4c2c680aeb9c0

    SHA256

    4aeec3bfa2428e70e1225c83e380c5f2f50ad23c3dc9187c39bd16f90996650b

    SHA512

    63ef4bd2e0510a88c6c10bc91a95cdf8ebcb015949a29a2843c045b9a5f535cd3a5b07ac816ebadd3d96bf113656fdac6d6132aeebd15baef96a390040225888

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    72KB

    MD5

    33034129f535e614dc8bc758e70246da

    SHA1

    6865a2d01d476cdd813c461dc0e5b6d81de8b2d8

    SHA256

    b69a6df124a86571c3d5202db608ac86aaba02727302154e6e353e6e3e203860

    SHA512

    2fb64d3c1e3a5300547731cc1a6accf99aeb2ba88d1d91c922851049ac2095852e57c605f0a0c4ef114aba949820d4f1dc5c5bf17d27bb5c3bb0fa00dce48d79