Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/02/2025, 04:38

General

  • Target

    afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe

  • Size

    80KB

  • MD5

    5f37185a894e45cbde1eed03f43d8ddd

  • SHA1

    b199139af55a447b1ff2a4f8bf7d7085ac2035ea

  • SHA256

    afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec

  • SHA512

    bde058e8bd10231e12572536fdd6a8c47798df152d7ce518498fd843df6158c1eec6dcd5b274b70e1736d54ad51dc11c76c8cdfd7062e056c438f6e7a749706d

  • SSDEEP

    1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:DdseIOMEZEyFjEOFqTiQmOl/5xPvwN

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe
    "C:\Users\Admin\AppData\Local\Temp\afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    8cae328c26921608221cec925a9ea554

    SHA1

    697acdd8f360d5aacf94f0928c81eb04225bcc07

    SHA256

    2cf31c4f624970c2e587eca799212dba60b29d48bdd3f729e46538e7dedd64ea

    SHA512

    978fff2a5b631d8a8366a32dba4859624353f2bf15d183e79ab10fa5b147156eb3e7b5ad0848a0163668e968c6fc7aeb8d69e4d0bc2a6ac80f309894450f5aaf

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    ba27b2a3d6148e0d6d919513d05cfd59

    SHA1

    556005d6612673b29bd956f7017a747c285ce76f

    SHA256

    01fb4ecf29bbe288ef4b71d1f0659818a6355cec60ab7c5d07ab91539d39bf43

    SHA512

    62a603adc37b3d813506a820d98fcf9e7a7905ab3b81d7acc6685e724207d17d8b0c797ddd71be2bc9774c1672cf5b34bb753d35de517693259118f3fb9cf239