Analysis

  • max time kernel
    116s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2025 18:51

General

  • Target

    04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe

  • Size

    96KB

  • MD5

    04d19ba87ec5e17d08b5d034006329c0

  • SHA1

    c9ece5653d9dd3d8212a0e4722d5753f62c4ca8f

  • SHA256

    04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90c

  • SHA512

    04df3c3d0c633aa819dd8dbeab615f061d5046eb5bd0c73168904d50c33ccbe97ae7c11699d4c88e760ad5b660f3e4567572143c58762013d90075ff1a415257

  • SSDEEP

    1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:zGs8cd8eXlYairZYqMddH13L

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe
    "C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe
      C:\Users\Admin\AppData\Local\Temp\04ca9a896bb58e5da858578e344c8becc0a3874a2555aaeb87fe6cd3aef8a90cN.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2040
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2356
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1348
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2216
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    96KB

    MD5

    015ef091408362aee7661ea5b51ad5c4

    SHA1

    24bbe5e0ee111439a378f0e24af57b76d0732b24

    SHA256

    5eb8136421ad315ff50a8cca57799615c42a09e57cc9e6e382d81732992def1b

    SHA512

    c0b167e786296743162217c39e792547041f7bec8398697c30e752f61bf4d850e944684f3ee80b979df1a42d1cf3d5e647366b0624f842b3daaffa6679dbe0c0

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    96KB

    MD5

    ca6a4e1ba3e64b60433127ecc6fb0b9c

    SHA1

    28b62f591a88cc162c8d76b407b5db449e54a487

    SHA256

    1d05818e419407fba3171b76f7a5fca5211a5483277277a6ed96d29fc8a32bc4

    SHA512

    f76f8e0207982bbda2a2c0a13a1d33689fa369dcd20fa497aac615420abaa74ceb63b6165027c2c87c9928cd88844ac7da526f0f3d6ccd99af2332be0c07e55b

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    96KB

    MD5

    5c71038b80a06027d245f41299dd061d

    SHA1

    71330de80f17b5addc8f279fd041395978a3eb5a

    SHA256

    0d980767ef404077e0c8cfd5adbc53e2f0270e7d6f6bd8c2f05b2e03daa67f68

    SHA512

    994aab6beabfe2c970e656a7855b10a2110bf9686675fddaf608eae773730985e00a89ede1315ff686a576b63c22fc1bceef3e2aa532976ff8824de530a47a63

  • memory/760-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/760-2-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/760-4-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/760-14-0x0000000000230000-0x0000000000253000-memory.dmp

    Filesize

    140KB

  • memory/760-22-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/760-6-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1348-73-0x00000000003C0000-0x00000000003E3000-memory.dmp

    Filesize

    140KB

  • memory/1736-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1736-9-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1736-1-0x0000000000230000-0x0000000000253000-memory.dmp

    Filesize

    140KB

  • memory/2040-55-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2040-57-0x0000000002100000-0x0000000002123000-memory.dmp

    Filesize

    140KB

  • memory/2040-43-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2040-46-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2040-50-0x0000000002100000-0x0000000002123000-memory.dmp

    Filesize

    140KB

  • memory/2040-37-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2040-40-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2184-34-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2184-26-0x0000000000230000-0x0000000000253000-memory.dmp

    Filesize

    140KB

  • memory/2184-23-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2216-81-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2216-89-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2244-91-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2356-67-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB