Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2025 04:48

General

  • Target

    c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe

  • Size

    76KB

  • MD5

    4d30c5bc4500c5f74c2a4886ba809b12

  • SHA1

    d4c8acc8caccd6bb4336d203646085cbc29794bf

  • SHA256

    c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8

  • SHA512

    2fcc8a37ed1bbe8ccc81ed94ce4cc3e2b0c2206a0145db47cbb7edd0456f0c38cec025eb239bf80998a8af01d9b32617e64892dd2da60d71ec2a47a97e73bd1a

  • SSDEEP

    1536:Dd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11f:jdseIOMEZEyFjEOFqaiQm5l/5w11f

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe
    "C:\Users\Admin\AppData\Local\Temp\c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:4488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    7bc211b46151025a4454e18b5a64535e

    SHA1

    532295e91edc31f9133db7891950def5db9b32d2

    SHA256

    fb521bf188bf7fb1632cc20f374823ad75353d961d02185eb28b476ec42253a2

    SHA512

    8c0138ccb2bdcbbe322cbf0d1924788ad5a4e8cfa1ad063ba35a4f7af85c6522a70f8cc51ca465ee12d354af9738a09c1254a7e8bccb30c84ed8ce7f11f30337

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    c21a49acc3ed2b6bb906e94bc03d9fce

    SHA1

    973dbed2a7dcd4686ecc4d607156e02703af7484

    SHA256

    6208dadb2794f7fcc8a3a6b88de430e50b362e35e84e9e66e00951a9468fe39b

    SHA512

    85f99cd6b6367b4a7f3486a17de28d208c8c52f469bc1a6e5e7ab7ac458bc06619404eb330bfb6a6e411bd4cd173fff79cc36a6769bf2dcf0061c5028d4f47c6

  • memory/2984-4-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2984-7-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2984-13-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4488-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4488-14-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4644-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4644-6-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB