Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 08:27
Static task
static1
General
-
Target
2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
056b6cbd35f6394cce9e01e1ccc9989b
-
SHA1
01cc02fefc0b5ed228d7df1ecab85ee381bd9d8f
-
SHA256
f664f1c324897e85ef6f87d701ce64fe7b25d5fa489ebf51cdb2d983db03298b
-
SHA512
f65b7d0e61fa17011bd25cb46ef394574c456a56d45c792f9ceaf77dac2bd97527fa929a0dd6c425a900abcb0de7a846f72965bc47806a96bd094880cee2a6ba
-
SSDEEP
1536:jDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:viRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1144 omsecor.exe 4416 omsecor.exe 3328 omsecor.exe 436 omsecor.exe 3652 omsecor.exe 1816 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4444 set thread context of 4816 4444 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 88 PID 1144 set thread context of 4416 1144 omsecor.exe 92 PID 3328 set thread context of 436 3328 omsecor.exe 117 PID 3652 set thread context of 1816 3652 omsecor.exe 121 -
Program crash 4 IoCs
pid pid_target Process procid_target 3696 4444 WerFault.exe 87 2864 1144 WerFault.exe 91 4984 3328 WerFault.exe 116 3564 3652 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4816 4444 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 88 PID 4444 wrote to memory of 4816 4444 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 88 PID 4444 wrote to memory of 4816 4444 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 88 PID 4444 wrote to memory of 4816 4444 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 88 PID 4444 wrote to memory of 4816 4444 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 88 PID 4816 wrote to memory of 1144 4816 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 91 PID 4816 wrote to memory of 1144 4816 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 91 PID 4816 wrote to memory of 1144 4816 2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe 91 PID 1144 wrote to memory of 4416 1144 omsecor.exe 92 PID 1144 wrote to memory of 4416 1144 omsecor.exe 92 PID 1144 wrote to memory of 4416 1144 omsecor.exe 92 PID 1144 wrote to memory of 4416 1144 omsecor.exe 92 PID 1144 wrote to memory of 4416 1144 omsecor.exe 92 PID 4416 wrote to memory of 3328 4416 omsecor.exe 116 PID 4416 wrote to memory of 3328 4416 omsecor.exe 116 PID 4416 wrote to memory of 3328 4416 omsecor.exe 116 PID 3328 wrote to memory of 436 3328 omsecor.exe 117 PID 3328 wrote to memory of 436 3328 omsecor.exe 117 PID 3328 wrote to memory of 436 3328 omsecor.exe 117 PID 3328 wrote to memory of 436 3328 omsecor.exe 117 PID 3328 wrote to memory of 436 3328 omsecor.exe 117 PID 436 wrote to memory of 3652 436 omsecor.exe 119 PID 436 wrote to memory of 3652 436 omsecor.exe 119 PID 436 wrote to memory of 3652 436 omsecor.exe 119 PID 3652 wrote to memory of 1816 3652 omsecor.exe 121 PID 3652 wrote to memory of 1816 3652 omsecor.exe 121 PID 3652 wrote to memory of 1816 3652 omsecor.exe 121 PID 3652 wrote to memory of 1816 3652 omsecor.exe 121 PID 3652 wrote to memory of 1816 3652 omsecor.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_056b6cbd35f6394cce9e01e1ccc9989b_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 2568⤵
- Program crash
PID:3564
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 2886⤵
- Program crash
PID:4984
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 3004⤵
- Program crash
PID:2864
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 2922⤵
- Program crash
PID:3696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4444 -ip 44441⤵PID:1720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1144 -ip 11441⤵PID:528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3328 -ip 33281⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3652 -ip 36521⤵PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5c2e4a2c422faa65f02cddf52ac7a0b4e
SHA1d75c385012afd88e469c380c1572371a2a5283fa
SHA2568f482cfd41c0a76d433c4e866cb1b39d1392d0c0d9a18cad6a90395a78d302f5
SHA5127118b9251e8528c7b57e4b102c0d62814fab90c2881929fe201d8cfb682a5a49f64e34a6a85c00b6c79df05a4a0c6c9fcf2a313e6c9364cef0dbdd5a577e5ad8
-
Filesize
134KB
MD567d877ffbd9568ff56aa906bd8f52a7b
SHA14e36c14ab708a365999f710d589688e617148c56
SHA256d768beb175442fd82261f21805e4ef50898c89f4820418ba118434ddf4054a63
SHA51230097d4ff6d8c6bf1b59a898e364e6bf3030521b11d5f01a60a1a15d6edaf12d74555386894bc606c5958cc8c1c1e2999f06e93f747676b1852c9296699aa9b0
-
Filesize
134KB
MD53b162b8b6112d9b1aa68f91ad582d600
SHA1d531a0aaf174b0ffaf239a78e395a0989729d581
SHA256b330da193ed2a7d6edfd9c47260d1cbd03c576d897ec995100b7964d72ddc10d
SHA512bd7feb0f089a6176bc481b35e34ffa8de9ec86dff530728de94967ef0faa8751d86df88785b3fbebced73ec487bcfa32af6519e7dd32adf39b8cf27ccd69b9e5