Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 02:52

General

  • Target

    41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe

  • Size

    33KB

  • MD5

    93503f48189b4a010ed4df298b50559b

  • SHA1

    e3c171b26db84355351c73502ac647853020a9f2

  • SHA256

    41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e

  • SHA512

    2054fe826e9a140d099361ff96b6ca888a84e9c8b6c854e053a919439cac9d10488b36082e4029f392c8a916708f677c7771a71b29d6b18f4948a9f82cbed542

  • SSDEEP

    768:afVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D1:afVRztyHo8QNHTk0qE5fslvN/956qo

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe
    "C:\Users\Admin\AppData\Local\Temp\41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    33KB

    MD5

    20e0edd9b3ab5e21a83bf68228bb94a5

    SHA1

    94734dbc80eac3c9660841ff091e4a032861e355

    SHA256

    e11170fec5bfc1eab3f1933867db49cf579431030d6576d56350b7fd73fd788b

    SHA512

    bd78629ca209100c710554f12d76cfd6f5d488616e489179d3fd3370ba15012691732a3a8cead714d64134e896921818b744454c3dfc95307ee25b04a2b3ad10

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    33KB

    MD5

    e4e94c2319f7cf2244157c90071396cb

    SHA1

    c82e51e2210d2974e675e61599cfb044402f7ed1

    SHA256

    a02a9720bc62b7135046e46bad2abffbc0b926f9f6bfa124ea071dfbfc39f1c7

    SHA512

    687a95551d8bae189b1df348ed08ab08b7b1fa53c7fb633b2237a6aa4dc595a9c2cb4cf0393ab5372826a96ed574b533f458e1397625f67540993dcd12c64481

  • memory/736-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/736-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4440-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4440-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4440-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4440-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4440-15-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4440-20-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4588-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4588-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB