Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 09:03

General

  • Target

    2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe

  • Size

    134KB

  • MD5

    a68e7eb94cc9de700743fc84a9c6c688

  • SHA1

    0514d33b2fe7dd8038b285c38ea65b56753f78e6

  • SHA256

    fa3247474797263213937c159008a160cfda3326bcd57d8fea2ff13121db9085

  • SHA512

    1db66903e2d2b7b813dc3e6e9842b00f01d385120d584b4bd3416322dbc167479622eb195309b32bf8d40e89fbefaab594da321387924b904f35c08fd8fd285c

  • SSDEEP

    1536:sDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi3:SiRTeH0iqAW6J6f1tqF6dngNmaZCiaI

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Users\Admin\AppData\Local\Temp\2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe
      C:\Users\Admin\AppData\Local\Temp\2025-04-06_a68e7eb94cc9de700743fc84a9c6c688_amadey_rhadamanthys_smoke-loader.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4932
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2204
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4388
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4540
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3044
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2688
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 256
                  8⤵
                  • Program crash
                  PID:2372
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 296
              6⤵
              • Program crash
              PID:2680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 288
          4⤵
          • Program crash
          PID:4004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 300
      2⤵
      • Program crash
      PID:2272
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5020 -ip 5020
    1⤵
      PID:3900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4932 -ip 4932
      1⤵
        PID:2460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4388 -ip 4388
        1⤵
          PID:1756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3044 -ip 3044
          1⤵
            PID:1792

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            134KB

            MD5

            ed2af1bc1226f28bb6a8626602635153

            SHA1

            0ec8287ebb6a072487bec9974dfc17f3886d44e0

            SHA256

            7d232dfd9429717d046a2a8d7040fddf5154949c54dab2423ca8699b71356f58

            SHA512

            b074249ab17f183976d8da9a2961a12bf77a421921fc09aafd96435552fa8fa64cf9ca1a8aa05df42a1b1e205a63be2e51b103ebb6737b696a9248d3f0e723e3

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            134KB

            MD5

            d82b084ef9c1c590c60da67db75a2154

            SHA1

            a32c4022bee0ee1d7ee039de9494ef2fe88fe8ec

            SHA256

            fd678e666ec389ad4c1f63c240a2aa1c1225679a25513ffb6e2916af4a05d933

            SHA512

            75df57527134c23d442efad1f5bb7b8c7072a3dd4d96065863f3c92b54eb08b319279a0b0d3980e6fa845c2df243f39699f62d1fd17e0ddea9ecb0c6fa3d1c88

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            134KB

            MD5

            51756737ef5d272cea05e3e6b0b97382

            SHA1

            96eb36883d989f349ac4c728cd0b6881294681f5

            SHA256

            5cd5d760c46eff7a25cad8607bbad9a48c3294f5474010df8e25ace8f555e6b5

            SHA512

            43aa42a4f5eb818b8317b11025770e8e047489754d61f0ba92e0f73f00a03e7a589fabc1e724ab61364f7b43bcbe9cbd16039e8aa64045604dbf3ba1fee0ac3b

          • memory/1488-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1488-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1488-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/1488-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-25-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-18-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-21-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2204-24-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2688-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2688-55-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2688-52-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2688-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3044-45-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4388-32-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4388-51-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4540-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4540-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4540-40-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4932-8-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4932-16-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/5020-17-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/5020-0-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB