Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 04:13
Static task
static1
General
-
Target
2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
21412af89714a3ea74b95e871871258d
-
SHA1
034e85221201ed5d8b9938172e8122dcc80199ed
-
SHA256
e8ba061c5faa8f9c811b758a4d5d803a354a888524adacdbb819b927dbe47918
-
SHA512
fc3519c9956cd02eceb1e432f1ccd853b8a7fbfa5d84a48cf65265d45092631140c72d6e7ed8fe3c6cfd6d46d3ffda9ed4e63600c2abf053d5fbdb41a559ee15
-
SSDEEP
1536:LDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi3:HiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4108 omsecor.exe 4800 omsecor.exe 3896 omsecor.exe 3768 omsecor.exe 2604 omsecor.exe 4200 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5088 set thread context of 3668 5088 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 87 PID 4108 set thread context of 4800 4108 omsecor.exe 91 PID 3896 set thread context of 3768 3896 omsecor.exe 116 PID 2604 set thread context of 4200 2604 omsecor.exe 119 -
Program crash 4 IoCs
pid pid_target Process procid_target 2052 5088 WerFault.exe 86 3688 4108 WerFault.exe 89 2216 3896 WerFault.exe 115 5012 2604 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3668 5088 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 87 PID 5088 wrote to memory of 3668 5088 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 87 PID 5088 wrote to memory of 3668 5088 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 87 PID 5088 wrote to memory of 3668 5088 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 87 PID 5088 wrote to memory of 3668 5088 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 87 PID 3668 wrote to memory of 4108 3668 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 89 PID 3668 wrote to memory of 4108 3668 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 89 PID 3668 wrote to memory of 4108 3668 2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe 89 PID 4108 wrote to memory of 4800 4108 omsecor.exe 91 PID 4108 wrote to memory of 4800 4108 omsecor.exe 91 PID 4108 wrote to memory of 4800 4108 omsecor.exe 91 PID 4108 wrote to memory of 4800 4108 omsecor.exe 91 PID 4108 wrote to memory of 4800 4108 omsecor.exe 91 PID 4800 wrote to memory of 3896 4800 omsecor.exe 115 PID 4800 wrote to memory of 3896 4800 omsecor.exe 115 PID 4800 wrote to memory of 3896 4800 omsecor.exe 115 PID 3896 wrote to memory of 3768 3896 omsecor.exe 116 PID 3896 wrote to memory of 3768 3896 omsecor.exe 116 PID 3896 wrote to memory of 3768 3896 omsecor.exe 116 PID 3896 wrote to memory of 3768 3896 omsecor.exe 116 PID 3896 wrote to memory of 3768 3896 omsecor.exe 116 PID 3768 wrote to memory of 2604 3768 omsecor.exe 118 PID 3768 wrote to memory of 2604 3768 omsecor.exe 118 PID 3768 wrote to memory of 2604 3768 omsecor.exe 118 PID 2604 wrote to memory of 4200 2604 omsecor.exe 119 PID 2604 wrote to memory of 4200 2604 omsecor.exe 119 PID 2604 wrote to memory of 4200 2604 omsecor.exe 119 PID 2604 wrote to memory of 4200 2604 omsecor.exe 119 PID 2604 wrote to memory of 4200 2604 omsecor.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_21412af89714a3ea74b95e871871258d_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 2688⤵
- Program crash
PID:5012
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 3046⤵
- Program crash
PID:2216
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 2884⤵
- Program crash
PID:3688
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5088 -s 2882⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5088 -ip 50881⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4108 -ip 41081⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3896 -ip 38961⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2604 -ip 26041⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56fadef6e3b64a2537f4f61184899a4bd
SHA139cfced427464572fcc6a6a0f09fcf80cb8e7a97
SHA256e6940a57b74b29358be54fef85f1bd0b1b3ad141528da2646b9ac828af323749
SHA5127de74576b39ef8a59d20b179f1479f03aa07dade1987755832782d171b40d1a126bf025fb5dd685896e7ec0273ffd812aebcb7381ae0b57f20f802cf74666183
-
Filesize
134KB
MD56b99e9f451af2d2161e5b1925ae914f2
SHA1f7e5fe7c42f3ba9340b5784bb2d792550b18680e
SHA256cc0f048c3562db7a838ed39c0f8fef5a7637e0335c16f228a1d9099457587c21
SHA5122e69c59ddfa394134d848dc756861ba13f898e787d0ce1f86fd27fab7ed5c4225cc0b09bb3c649896d224aeb3a8f08271c5e90be3d7036f79a07aa01a747d563
-
Filesize
134KB
MD5ff16419942d4f59b1d79bde642366e07
SHA13195bbb7dfdd7d05432afa71fcb2f21400d0de00
SHA256a4f723cb2853378f1056d65ac14b4c895354c72dc7394688aea6e2ec993ddeb8
SHA5120b0808bc23152c463353aac114244c838f5abef3e77cd6e2fb5503644a0a8c3b2284e3579ef58b84a0f35d22f8a33b369c57cc2d079cb700605595fba70052d0