Analysis

  • max time kernel
    116s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 15:37

General

  • Target

    065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe

  • Size

    76KB

  • MD5

    81fcbbf335f57c98713f9ed7cbde61c0

  • SHA1

    fd441e63eba1e52c49fe0a4c746cb68177af9979

  • SHA256

    065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76b

  • SHA512

    c9476c644af262c4c9339b82d913922e867e91994512523624cf7675db5be265ce495c7b4493e5d0ae4ce877587371acb6d2197481fe92346f65c1b197f38760

  • SSDEEP

    1536:cd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11f:kdseIOMEZEyFjEOFqaiQm5l/5w11f

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe
    "C:\Users\Admin\AppData\Local\Temp\065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    f64ea2fa9bb76fd9e3ed2ff36e05b04a

    SHA1

    3be7d2a55f38d6775c907fcea19caf6d3582a640

    SHA256

    acf5f3357654db076d1dd24e3bef84d9f7b4c16a07f0a742ff16c35e6bda865e

    SHA512

    43d16429e8972fec08404737316ffee1e792120d586d5e6362986d9f10b7192d1763c1e13b6affabd66aac73cd8a99b0d13f9969a19dc5f15fe96eb39dacd6ce

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    e53845424aaeab9aaeb8df3332e786af

    SHA1

    325ec57ff6939af482c2289478326d4f831165c2

    SHA256

    eab31f76102e1be6439c1e212478cb71ee314bcdf71447a0aacfdcae449c25aa

    SHA512

    1da280b64a990a8e4f479e78306a4a459bde63f3d2655115639243737196df24b8f61c1608e9119cfaaedca72416271d3ffa86a6844375b196058dc66f14b48f

  • memory/2664-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2664-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2828-5-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2828-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2828-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2848-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB