Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 01:45

General

  • Target

    481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe

  • Size

    96KB

  • MD5

    e33561a5d465e9efe456d20a8c0e24bd

  • SHA1

    1aa6e4583896e70a1dd33e603f6e46308a050913

  • SHA256

    481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4

  • SHA512

    097dcc25e348a1fb5857e14e4097301893dc2c4f47d8e9f63e216710fb916b3d035a2c0f233fd219235fd59afb9d2d774cbe4827b4d71fa23e5962d7f24d6d63

  • SSDEEP

    1536:ynAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxJ:yGs8cd8eXlYairZYqMddH13J

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
    "C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
      C:\Users\Admin\AppData\Local\Temp\481fa76b57b368029368b33f8296513dc99064f7bfadfddb2c6e6a43c43412a4.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3456
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4192
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2496
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4700
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3032
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 244
                  8⤵
                  • Program crash
                  PID:244
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 292
              6⤵
              • Program crash
              PID:4484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 288
          4⤵
          • Program crash
          PID:2236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1624 -s 304
      2⤵
      • Program crash
      PID:428
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1624 -ip 1624
    1⤵
      PID:2640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1744 -ip 1744
      1⤵
        PID:4740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4192 -ip 4192
        1⤵
          PID:1104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4700 -ip 4700
          1⤵
            PID:2204

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            be17593cc52f2fa0265fbfde1303b699

            SHA1

            0e87e73ff83f5adcce7ac91f55c20dacf0da4db1

            SHA256

            586debc60776268da076a9be34efe8ce486e372032f2ab213f44270925a1f25c

            SHA512

            dfc3e9788b0256f6de849093d5c0e27624bd6880681d8b7f2befaf971391da4ffa82d5aa07f3653e88df2b86ee46eca8de7631f25b36252203c407c595162320

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            3c5d6230f85d3bd9cf32bd465c3463ff

            SHA1

            8bec94428b67ff1c8efcda13c83ea454a208f057

            SHA256

            3e0254282f6415bd9e3329007f2ea13083367f0b382bcb03b2c827128eef2e07

            SHA512

            d42b16b679f0208ab06779b6bc7a5ddc26a485be0bb9b68b67117557abea5125e004e35e69bee0051ba7046a77564eda44e1e25c3a408715a734d65f6bcde2b3

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            1231ac8a9424a9100acfb8519b64aae7

            SHA1

            6c231538f9615514a184a1f41719d55645156c01

            SHA256

            8670d2301d4c5f2de0508f21a2cd2e994bf8fe7dcf70cb35d887318b3a17cd09

            SHA512

            7c5afdd3a5519f8e128ae5c5d6c244cad321b73c69976f533b836811d5d8767c361a2eb2ee71daef4a1910e31c559ce78ba75c8cf78037bd7bc27adcfed73a2b

          • memory/1624-18-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1624-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1744-20-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1744-10-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2496-39-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2496-40-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2496-42-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3032-55-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3032-51-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3032-52-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3456-24-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3456-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3456-16-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3456-21-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3456-35-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3456-28-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3456-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3736-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3736-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3736-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3736-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4192-36-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4700-47-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4700-54-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB