Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2025 03:03

General

  • Target

    eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe

  • Size

    80KB

  • MD5

    518e6b9d214afd8d61414dbbb36e505d

  • SHA1

    7f4f90331832ff8df74bf89ad116570543e3bc16

  • SHA256

    eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5

  • SHA512

    29a11dce3a7862e726cabe8245528af47bd8288a47004675bb40d8c3972d9445b81b81dbe01d142d58536b6ae889bc1e70d9def8ddd96e3036a67268f84473be

  • SSDEEP

    1536:rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:bdseIOMEZEyFjEOFqTiQmOl/5xPvwv

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe
    "C:\Users\Admin\AppData\Local\Temp\eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    b2ad24feaa73865d2050d9e5cc01b0ef

    SHA1

    353b9cf1b23ee96175bbb04298bbf6922e8940dc

    SHA256

    2ec248bc5ccee7a88cc503c96941927c38088b90ae0f524b7f20b9a4144d7a31

    SHA512

    e022d5d0c01d8d13c7997fd202874b31f11b9d4d437f9f556c2d068f1909c747f799d883dcfaf91d979242d0844e620335e7a3dfbb5a93d304e53db6b1eb9ef5

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    5ab603207d639795b63f2a9afea12132

    SHA1

    7d974be3b91c59097e34d7715fbc64adefd1a50d

    SHA256

    c39fbb13554db4286e8647336a3447ddab08f4f4a95e183348aa7152c0d39a1d

    SHA512

    3166c7a1ec85d32b6099203b1c376f33dc46df39ff043230e80fd9ce265d59331fe901d8e117f79eb54d97885f9c69dfdc86fac4da9ed99b7102851473cb1684

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    c319c59f381ac9f729991f3575b104ea

    SHA1

    9d2bc9afa3cb02cce572c9fa12d897417e8bd808

    SHA256

    cbf98e53dd2acd9c3b1e395523f0f20d801ae3b26c1f9b7787496324d6b2ad28

    SHA512

    270873939798f49e164853b95d40c56953adeb918ad61d668efed4ceb1fdbf96b51031466e9aead09e500000de1682deada9fb918feda3e703fe756e2cb9c19d