Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2025, 16:01

General

  • Target

    3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe

  • Size

    96KB

  • MD5

    0a40b0a014c036e6d27dd45bf0edf260

  • SHA1

    52937a8666e9811f57b77872d75a1147fc612dbb

  • SHA256

    3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620

  • SHA512

    88426746aa304f462eacf6f48b2a6baea193ae82e11059bf555d08ccac96f28a617fdbc97815ab3fa72c414f6f806f3c4dd143c1eab355dc0f4014ae17fa522f

  • SSDEEP

    1536:DnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:DGs8cd8eXlYairZYqMddH13b

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe
    "C:\Users\Admin\AppData\Local\Temp\3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Admin\AppData\Local\Temp\3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe
      C:\Users\Admin\AppData\Local\Temp\3531af429007bda95caa5d25c0b81a58e393b39a533fe533e410824f9a481620N.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4188
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1872
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4548
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4728
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:464
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2204
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 256
                  8⤵
                  • Program crash
                  PID:4344
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 292
              6⤵
              • Program crash
              PID:2936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 300
          4⤵
          • Program crash
          PID:4672
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 300
      2⤵
      • Program crash
      PID:436
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 556 -ip 556
    1⤵
      PID:3164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4188 -ip 4188
      1⤵
        PID:3656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4548 -ip 4548
        1⤵
          PID:3264
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 464 -ip 464
          1⤵
            PID:2244

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            efe1cbd38e296c46e0f2687decb2e8f5

            SHA1

            476889cbf1013ba0dbf8e3452679fce5bbca8d91

            SHA256

            1379968a9df68820133abfb4e7e5693d5e5cdea1c0deebf3ed8ea29529e89167

            SHA512

            3fbb639b633dd452773399ab2c35a532567fe10a02641f33f8506071e94123d1af51154cfffad7febc9fe3d4c2a239a9bcace53e10967ee38da0eb41807e70b9

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            96KB

            MD5

            910632cab3e18188b75277e7e4d7579b

            SHA1

            292d3104cfa756375dba6e28ca599c4b8d2b3744

            SHA256

            84b2e9c61b1e8abf53823d4128fbee4717aaa1ea2993a14342df447ea61a3d8d

            SHA512

            19c96a7fa7400837f66cb8451309b23ca396d9450824040d1364fe57104aba01d7b635f14a59b487f6b259d90276145760577b54eea00e53e0107324849daa8e

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            96KB

            MD5

            c17e468e213fce46cac74d2f4a50d74e

            SHA1

            d8784aff814233754234a87b421c850f3af6e79f

            SHA256

            58ec2d8874b911ea64c4eb4afb69bf563d0fcc1f2530969608a12340d51876ac

            SHA512

            bb99f6e61f08ca857cc66bedc3da2dfd242367d104bfd4591f2af202729ac34765a0c8d56cdabd98dbf62a8e9ef731ba969c46a86806b6175d0faf37c7a4285c

          • memory/464-52-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/464-44-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/556-0-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/556-17-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/1872-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1872-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1872-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1872-30-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1872-19-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1872-22-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1872-25-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-53-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-48-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4188-11-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4188-18-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4548-31-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4548-51-0x0000000000400000-0x0000000000423000-memory.dmp

            Filesize

            140KB

          • memory/4728-36-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4728-42-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4728-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4744-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4744-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4744-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4744-10-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB