Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 11:54

General

  • Target

    b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe

  • Size

    65KB

  • MD5

    e46be8d0d00de9b46935c8980d1f3079

  • SHA1

    4c639e0805c24b7ec0d7ae07a312927057ed4b08

  • SHA256

    b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c

  • SHA512

    72fadf5d855a0a83276c5abdd96dd87988baea45706911f0990b6211e8338c2097eab427b66bda0dc6ea5331cc160b79fc3ab33ef434bb50f2d8dfccae1a1d99

  • SSDEEP

    1536:nd9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hzw:PdseIO+EZEyFjEOFqTiQmRHzw

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe
    "C:\Users\Admin\AppData\Local\Temp\b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:592
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    65KB

    MD5

    0578f6a6c66678a9287d8421caf3f355

    SHA1

    36b09c19bf699e9b8fc9dc2d8a36b0a655f85870

    SHA256

    5367d4a148f0dcc07ac69ef08f9b9f9bd001276ae31636a4b5b12351e8b1c90a

    SHA512

    5513fee263c5fd06fd7ec054efb1b8f91fd867720c71db4f68567f1cf7964825f17de8f5914b914b1c4780d431ad409ddb340fa1ac6aa8a334e4ab55e4e1b72e

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    65KB

    MD5

    03ba3b3a97ac91407bd8e7ba9b5d6fad

    SHA1

    d4d62070bd94a4f565e3fb4805411022396ae477

    SHA256

    31ad91b5f81e01e0520e02ea6f0d5c72e4a02f8db4391c88276db4284be8de24

    SHA512

    b2e8954b5c63a0ee34c76e2bfaec120a009eedada320631ac4f724470eb72c4fee11a640850ed0537645556be2296749fae3576e68bca4f20b98836e7bd8472b

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    65KB

    MD5

    94668da05d5db517c1eec198022e9c29

    SHA1

    886f30210be69760b7cbc5518bba29287f00b42a

    SHA256

    b485c63e88ed49d8198b9f214920000321b8ee43ddefaf28acb5a00fde762a01

    SHA512

    4ff49f94c93048f58c62c130a0f9b72bd225a0ba0c86c47ff3b86255ffaa79926cf4b431eec99712cfb4018dc279804852b4a1911b6611f0666bbcc2806b9435

  • memory/592-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/592-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/768-27-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1560-36-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2172-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2172-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2172-18-0x0000000000280000-0x00000000002AA000-memory.dmp

    Filesize

    168KB

  • memory/2172-24-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB