Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 09:10

General

  • Target

    4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe

  • Size

    96KB

  • MD5

    c76ae9d599a9785e771abf4f29ceecfb

  • SHA1

    5081943f7567b15af6bd451e27ce37b46b2b3908

  • SHA256

    4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47

  • SHA512

    0e747cf070e24c6d8a509079f7dd33c3ec9175a6c3df13e038a30a7b90daf56c3b40497b1f0ec0970818ba56d76bf9df65c5ce86f0eeb71eb6514b1b41c31ad7

  • SSDEEP

    1536:jnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:jGs8cd8eXlYairZYqMddH13x

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
    "C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
      C:\Users\Admin\AppData\Local\Temp\4aaca5ed0bd7cdc33f1295f68bf14c9a937514c01d9c1bd65e1a80a411ec8c47.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4236
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3948
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1404
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1656
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4964
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 244
                  8⤵
                  • Program crash
                  PID:952
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 300
              6⤵
              • Program crash
              PID:2972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 288
          4⤵
          • Program crash
          PID:4392
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 276
      2⤵
      • Program crash
      PID:3184
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4140 -ip 4140
    1⤵
      PID:3456
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2784 -ip 2784
      1⤵
        PID:4480
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3948 -ip 3948
        1⤵
          PID:4632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1656 -ip 1656
          1⤵
            PID:4004

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            d977eb153d2981b0ab3d968a5c62662b

            SHA1

            2a8866685a3f9c179002fb36ab21f3d2a2a70598

            SHA256

            358c49f4dd479d458ad562dd0b29ebd836600fb9e00b3bd85f44a13b08885d5d

            SHA512

            db5e5996781cd8f09beae46e37b064233461802150a87d1425b9e0e364132eb8515b8a45d47984cad1a7eb511dd07d663b2f92c11a1261d4d2999a77e3c88ef1

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            ff0a66d0ab28d44b16d0f46ac6d21dce

            SHA1

            6fce2a89f4e37ba34a24902f12450ef1a08c81bf

            SHA256

            7f793f841df69ae717b8d3693bfcc430fd9ed036b0adf08ad80b2cfe5ab0f081

            SHA512

            ec63375dc7584e774f5b95b25a12ecae1970126579e98b8f82ffded598edb06f83d76312658b79d72a7e7cd9ff0d68427c9ab7f8a7301ad33925c99d7c96d1c9

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            0d947be482c8ae220190ba4c1122153b

            SHA1

            66e389ebda838b74a2d8c235db23cc6678c6f046

            SHA256

            ae41dbd4503c452521322d318e2fc90f0bd995afb44bbadc7a5e792a54968abd

            SHA512

            adfb0fc976dd9d4de197b2fabe57be5e532b8c37284dea48b7c1617caf64026de93c14c48a40b42ab515dd0717bbbc0328ac0d4510da89260cdf3b03ff807075

          • memory/1404-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1404-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1404-40-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1656-45-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1656-53-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2784-19-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/2784-11-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3908-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3908-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3908-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3908-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3948-52-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/3948-32-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4140-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4140-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4236-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4236-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4236-27-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4236-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4236-23-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4236-20-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4236-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4964-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4964-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4964-54-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4964-57-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB