Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2025 00:58

General

  • Target

    94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe

  • Size

    80KB

  • MD5

    894262470ec2d9f77994e9f2bb2c4aa9

  • SHA1

    b8f803e1f56c5c15132414a12cc563459e178013

  • SHA256

    94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209

  • SHA512

    38eb54f81db4b0c9c84c3f1521ed976306de1ae0815a414fe3a8443aeb51867f52aaa84789fd074a3bb76c50d6163d057d98cd6b1e0a277171e84a55f9f68e98

  • SSDEEP

    768:qfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAK:qfbIvYvZEyFKF6N4yS+AQmZTl/5S

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe
    "C:\Users\Admin\AppData\Local\Temp\94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4504
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:4408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    2588aa549ec9376c08ad8bfa60751ada

    SHA1

    faf51ca3d8152dff6eeda38c50b1b8dcb54d0940

    SHA256

    e43b856bb073d6471caf1f020f55e53c626a24e21284d1f080e32e32298b1fed

    SHA512

    8acb573c30b86af1dcc7475eac8d66303cfc70413492f81bb2c9893e0afce23602f8ecda767680749ca5322aa2dced37ef1aff5896151736cc7cec0eeea13ba9

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    9ae8f13dccac886f24842d55a7b689df

    SHA1

    d6dea147e4cf421d45cc4494e9d13fe8c6d59e9b

    SHA256

    0992bcba2cc8f7c49ac0716e7112c7b6e999738b3d52d718b079d82f25c0dbda

    SHA512

    afb153295a33cee7cb9db933d43310d50f4fd64787e989a3cc831bd7a4b16d3cfc664f17a06b2a3bf46351cb130ce1bab9973723df0c9062b3eec97652fd8725