Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 09:03
Static task
static1
General
-
Target
2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
a68e7eb94cc9de700743fc84a9c6c688
-
SHA1
0514d33b2fe7dd8038b285c38ea65b56753f78e6
-
SHA256
fa3247474797263213937c159008a160cfda3326bcd57d8fea2ff13121db9085
-
SHA512
1db66903e2d2b7b813dc3e6e9842b00f01d385120d584b4bd3416322dbc167479622eb195309b32bf8d40e89fbefaab594da321387924b904f35c08fd8fd285c
-
SSDEEP
1536:sDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi3:SiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4932 omsecor.exe 2204 omsecor.exe 4388 omsecor.exe 4540 omsecor.exe 3044 omsecor.exe 2688 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5020 set thread context of 1488 5020 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 87 PID 4932 set thread context of 2204 4932 omsecor.exe 92 PID 4388 set thread context of 4540 4388 omsecor.exe 119 PID 3044 set thread context of 2688 3044 omsecor.exe 123 -
Program crash 4 IoCs
pid pid_target Process procid_target 2272 5020 WerFault.exe 86 4004 4932 WerFault.exe 90 2680 4388 WerFault.exe 118 2372 3044 WerFault.exe 121 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1488 5020 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 87 PID 5020 wrote to memory of 1488 5020 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 87 PID 5020 wrote to memory of 1488 5020 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 87 PID 5020 wrote to memory of 1488 5020 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 87 PID 5020 wrote to memory of 1488 5020 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 87 PID 1488 wrote to memory of 4932 1488 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 90 PID 1488 wrote to memory of 4932 1488 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 90 PID 1488 wrote to memory of 4932 1488 2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe 90 PID 4932 wrote to memory of 2204 4932 omsecor.exe 92 PID 4932 wrote to memory of 2204 4932 omsecor.exe 92 PID 4932 wrote to memory of 2204 4932 omsecor.exe 92 PID 4932 wrote to memory of 2204 4932 omsecor.exe 92 PID 4932 wrote to memory of 2204 4932 omsecor.exe 92 PID 2204 wrote to memory of 4388 2204 omsecor.exe 118 PID 2204 wrote to memory of 4388 2204 omsecor.exe 118 PID 2204 wrote to memory of 4388 2204 omsecor.exe 118 PID 4388 wrote to memory of 4540 4388 omsecor.exe 119 PID 4388 wrote to memory of 4540 4388 omsecor.exe 119 PID 4388 wrote to memory of 4540 4388 omsecor.exe 119 PID 4388 wrote to memory of 4540 4388 omsecor.exe 119 PID 4388 wrote to memory of 4540 4388 omsecor.exe 119 PID 4540 wrote to memory of 3044 4540 omsecor.exe 121 PID 4540 wrote to memory of 3044 4540 omsecor.exe 121 PID 4540 wrote to memory of 3044 4540 omsecor.exe 121 PID 3044 wrote to memory of 2688 3044 omsecor.exe 123 PID 3044 wrote to memory of 2688 3044 omsecor.exe 123 PID 3044 wrote to memory of 2688 3044 omsecor.exe 123 PID 3044 wrote to memory of 2688 3044 omsecor.exe 123 PID 3044 wrote to memory of 2688 3044 omsecor.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 2568⤵
- Program crash
PID:2372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 2966⤵
- Program crash
PID:2680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 2884⤵
- Program crash
PID:4004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 3002⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5020 -ip 50201⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4932 -ip 49321⤵PID:2460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4388 -ip 43881⤵PID:1756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3044 -ip 30441⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5ed2af1bc1226f28bb6a8626602635153
SHA10ec8287ebb6a072487bec9974dfc17f3886d44e0
SHA2567d232dfd9429717d046a2a8d7040fddf5154949c54dab2423ca8699b71356f58
SHA512b074249ab17f183976d8da9a2961a12bf77a421921fc09aafd96435552fa8fa64cf9ca1a8aa05df42a1b1e205a63be2e51b103ebb6737b696a9248d3f0e723e3
-
Filesize
134KB
MD5d82b084ef9c1c590c60da67db75a2154
SHA1a32c4022bee0ee1d7ee039de9494ef2fe88fe8ec
SHA256fd678e666ec389ad4c1f63c240a2aa1c1225679a25513ffb6e2916af4a05d933
SHA51275df57527134c23d442efad1f5bb7b8c7072a3dd4d96065863f3c92b54eb08b319279a0b0d3980e6fa845c2df243f39699f62d1fd17e0ddea9ecb0c6fa3d1c88
-
Filesize
134KB
MD551756737ef5d272cea05e3e6b0b97382
SHA196eb36883d989f349ac4c728cd0b6881294681f5
SHA2565cd5d760c46eff7a25cad8607bbad9a48c3294f5474010df8e25ace8f555e6b5
SHA51243aa42a4f5eb818b8317b11025770e8e047489754d61f0ba92e0f73f00a03e7a589fabc1e724ab61364f7b43bcbe9cbd16039e8aa64045604dbf3ba1fee0ac3b