Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 01:45

General

  • Target

    481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe

  • Size

    96KB

  • MD5

    e33561a5d465e9efe456d20a8c0e24bd

  • SHA1

    1aa6e4583896e70a1dd33e603f6e46308a050913

  • SHA256

    481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4

  • SHA512

    097dcc25e348a1fb5857e14e4097301893dc2c4f47d8e9f63e216710fb916b3d035a2c0f233fd219235fd59afb9d2d774cbe4827b4d71fa23e5962d7f24d6d63

  • SSDEEP

    1536:ynAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxJ:yGs8cd8eXlYairZYqMddH13J

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
    "C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
      C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:752
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2884
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2892
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    96KB

    MD5

    3c5d6230f85d3bd9cf32bd465c3463ff

    SHA1

    8bec94428b67ff1c8efcda13c83ea454a208f057

    SHA256

    3e0254282f6415bd9e3329007f2ea13083367f0b382bcb03b2c827128eef2e07

    SHA512

    d42b16b679f0208ab06779b6bc7a5ddc26a485be0bb9b68b67117557abea5125e004e35e69bee0051ba7046a77564eda44e1e25c3a408715a734d65f6bcde2b3

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    96KB

    MD5

    7ffd5be8a0318382766605cf46718777

    SHA1

    d0fdbbf71d9e43a56f9fa6d621bc3a8bc9ab57dd

    SHA256

    0b221066aa8fc4274e6433e2d65ab685c9ea79886c69890b0b2011edfbf1059b

    SHA512

    dc509c4da21640efd4427de1c756adab535a5ef0740e8219e702725da2a2b9f2bb56a3824933f544a6f4f2326c3d6bb97752d5e71c65fac253c57f4e6a0ac3cc

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    96KB

    MD5

    6d7e728d9755506b5593466cc8df9f08

    SHA1

    f0288ee3ba6c7919002542513ecf987c6f45bb7b

    SHA256

    3d6c7dc3eb040d30cf0052c392988572c01641c87b0dda396ca54f05ec587d3c

    SHA512

    cf39ff4e8f52ed8121fbdef9fcb72df680d1bb3823e4a2886d1cfebb386208775e39e5fe127d9a106d4522338fd2b77451202820eea5a9898e08d81d0a9582b6

  • memory/752-66-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/752-58-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1364-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1364-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1364-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1364-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1364-20-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2288-91-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2644-8-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2644-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2644-7-0x0000000000230000-0x0000000000253000-memory.dmp

    Filesize

    140KB

  • memory/2684-45-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2684-42-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2684-48-0x0000000000290000-0x00000000002B3000-memory.dmp

    Filesize

    140KB

  • memory/2684-57-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2684-39-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2684-35-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2812-22-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2812-31-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2884-73-0x0000000000240000-0x0000000000263000-memory.dmp

    Filesize

    140KB

  • memory/2892-81-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2892-89-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB