Analysis

  • max time kernel
    120s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2025, 20:40

General

  • Target

    18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe

  • Size

    80KB

  • MD5

    74d1bab26ffb89f754807e40798a6736

  • SHA1

    02935a3921f1a6df1db84287039cb276b8484b25

  • SHA256

    18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8

  • SHA512

    b7ea77639895043898e636c64134aa8905a7a8e57a4ec1f33e74f903400aab9af852e693c591cf4c06e528cb2f73671612eb644e1ddf4e4909460a8c0fd1748a

  • SSDEEP

    1536:Qd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:QdseIOMEZEyFjEOFqTiQmOl/5xPvwv

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe
    "C:\Users\Admin\AppData\Local\Temp\18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2292
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    524586543a4152a9da786a662d7a9af7

    SHA1

    9d47400e3b57465a7fbd4f83b15d01b41e28c339

    SHA256

    6046a1f9d8aa71b8dbc6fff0a026b259acc5d3e74ffb6824fe50d3f814eaf895

    SHA512

    a2df81929f5274828dfe53a7ba612a33f87d1a4d9d856191800e962cac36288c8d67534ab86023478f00354023f36f2d384c71d4088a0427af1e7c50ed62d37c

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    80KB

    MD5

    dc3935f88da507faf8d2a4d4fca10c80

    SHA1

    a53e6ba06be539e06338a7836042f07443400199

    SHA256

    62f51623ee3010e38a2e813c68e2a15c4dc210ac19fc5ecb02736fdadd09ffe8

    SHA512

    06935069bb3a497b5473db774817369bc47066c50a8c1d8276c11a7daf64b262c410505b6b9bea484943663c01b11bdef191bdda059d6b4c11281be44d63e372

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    80KB

    MD5

    64579266c5277b47fca3aa001eb101f8

    SHA1

    218d0411b307f8552f60fcd17ec6d12166d1ce5b

    SHA256

    5a17d5d991895bafc469c6359c4cf901a2694d9367e3fec66f3f35fa05a4c019

    SHA512

    bf540722385fbe38aacf048db1f2acd6c1557ad4b08b7d311bc8664f50a865c71c1c75414e1bde0d62529a53d1c8c33f119dee7117a697281288aecc81b37cd6