Analysis

  • max time kernel
    114s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 11:54

General

  • Target

    b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe

  • Size

    65KB

  • MD5

    e46be8d0d00de9b46935c8980d1f3079

  • SHA1

    4c639e0805c24b7ec0d7ae07a312927057ed4b08

  • SHA256

    b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c

  • SHA512

    72fadf5d855a0a83276c5abdd96dd87988baea45706911f0990b6211e8338c2097eab427b66bda0dc6ea5331cc160b79fc3ab33ef434bb50f2d8dfccae1a1d99

  • SSDEEP

    1536:nd9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hzw:PdseIO+EZEyFjEOFqTiQmRHzw

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe
    "C:\Users\Admin\AppData\Local\Temp\b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    65KB

    MD5

    5c5d5864c4ec923d748f66b32c11c82d

    SHA1

    6f8848cf3162fedd1470a7e1862da9ec9846061c

    SHA256

    d6f503c8e6337dbbdc9c993788c15381e548055e59f1150f3d65ba9c531feb63

    SHA512

    bae5aeaa94f33c8e614d4e37fbeb9f198c830b6a260bdd4265573091afda6f3f3004c3c0bf721a02825919b31d1ce1df34c9c22bb14610a06bf8c7ea32bf9def

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    65KB

    MD5

    03ba3b3a97ac91407bd8e7ba9b5d6fad

    SHA1

    d4d62070bd94a4f565e3fb4805411022396ae477

    SHA256

    31ad91b5f81e01e0520e02ea6f0d5c72e4a02f8db4391c88276db4284be8de24

    SHA512

    b2e8954b5c63a0ee34c76e2bfaec120a009eedada320631ac4f724470eb72c4fee11a640850ed0537645556be2296749fae3576e68bca4f20b98836e7bd8472b

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    65KB

    MD5

    0fe3f6b300447be4b972378e48f1a4f3

    SHA1

    307b5dcedc8e5d328f1d5797af994a054199eb47

    SHA256

    61a5f31d49e4fcbf5de1cf699810ba590449947c337acc5b908ffa8e196a6198

    SHA512

    ed1dfef1ab5fee5bfa262fc8cc9677c39823e8bb9b643db23f9e4251555e844d4ca07744a24cfcd3bf0403a000d3dd00a5f3382ae9064922efcf6c1341755234

  • memory/456-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/456-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2900-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2900-17-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3172-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3172-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3248-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3248-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3248-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB