Analysis

  • max time kernel
    116s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2025 18:12

General

  • Target

    cd86ae248b4fdc7b93429dc926f941452378e66841c5f6a3cd5655891045d547N.exe

  • Size

    96KB

  • MD5

    b638a9c8e31dadeeb313a6e2358b3b70

  • SHA1

    77bf3b34cd5aea0f032915216adcaf6df744543f

  • SHA256

    cd86ae248b4fdc7b93429dc926f941452378e66841c5f6a3cd5655891045d547

  • SHA512

    5bb242333346467d299ff477086d5c0975a7c9ce057eb4ae8c676ad1413dfc938c88a21d83549ad8bc0b2562da72ce4bd8fba2acf6c603954dc1e675581cc23d

  • SSDEEP

    1536:unAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:uGs8cd8eXlYairZYqMddH13L

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd86ae248b4fdc7b93429dc926f941452378e66841c5f6a3cd5655891045d547N.exe
    "C:\Users\Admin\AppData\Local\Temp\cd86ae248b4fdc7b93429dc926f941452378e66841c5f6a3cd5655891045d547N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\cd86ae248b4fdc7b93429dc926f941452378e66841c5f6a3cd5655891045d547N.exe
      C:\Users\Admin\AppData\Local\Temp\cd86ae248b4fdc7b93429dc926f941452378e66841c5f6a3cd5655891045d547N.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:760
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2020
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2192
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    96KB

    MD5

    17c92d2a87dde55deb8a94c57266d0ab

    SHA1

    838a1aff5c8418fedca3868873a93a7cc8fa461d

    SHA256

    48621fc916cb76d7dc03b8a15e0e58eac575c59d7a1efcb61e7eef0aef630e23

    SHA512

    c9cb8442a0a1bd8573c671a2797e237e176e2659adf9710bab70d3553355f7415b9ce6ddb18407c65cc542e3fde36878081d27791c0876629bb5d538be7a325e

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    96KB

    MD5

    96f9b67a8795393f9c934adf9acc4c4b

    SHA1

    d6809346b615a158e3126e5fc2dcf43c0271205a

    SHA256

    aa4432f5229f32947357fb9158fee2958c2b0467ab02f3a6785816a4a8c6f94b

    SHA512

    2e09ab80edf2f44a13211c063014b9e7f6a5d49fe19fb12fd03b305f39232868d04c40a6c7eeaaade7e65ae76aa17a02479e1f1dcb80aec97415c17a0db65038

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    96KB

    MD5

    5308beeab955048b3e764c3edf0cdaeb

    SHA1

    a6e6329dcee88f0728d7ddee4fcb085dbd296069

    SHA256

    1fcf425db9a59f68768d537d381f46c54e9ac58c857239fb2dcce7c0dc8ee2e8

    SHA512

    87f245b0bc3e020d3d07dd28dd6adc3e961682492205382c1f97f2ce907b3793f5c287d29ba6a20161f6adb5e575e9116f6a760e231aace59a22c947d4e80be1

  • memory/760-69-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/760-58-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1944-90-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2192-80-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2192-88-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2448-7-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2448-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2724-24-0x0000000000310000-0x0000000000333000-memory.dmp

    Filesize

    140KB

  • memory/2724-32-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2724-21-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2748-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2748-19-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2748-9-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2748-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2748-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2880-38-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2880-56-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2880-48-0x0000000002090000-0x00000000020B3000-memory.dmp

    Filesize

    140KB

  • memory/2880-54-0x0000000002090000-0x00000000020B3000-memory.dmp

    Filesize

    140KB

  • memory/2880-44-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2880-41-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2880-35-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB