Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 09:49
Static task
static1
General
-
Target
2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
af30f58b786b4b55b245824ea3353abb
-
SHA1
bbfe18140fb6f501c9271cc7afc26ed552f33829
-
SHA256
961fb0e0fe09aa12127308ae110d1aeb6c94cc94f8a2ab266ef2759c327c1e24
-
SHA512
2fccdd06225224d1308ea56537e06013c09cf7e4d653192c4595679bf6da1e6d914a25f3cbb8737b288a39c43e598499eaeaa50d9764080f77eaa67198ae9425
-
SSDEEP
1536:iDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiP:UiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3640 omsecor.exe 2384 omsecor.exe 4044 omsecor.exe 1952 omsecor.exe 3676 omsecor.exe 4348 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1016 set thread context of 6088 1016 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 85 PID 3640 set thread context of 2384 3640 omsecor.exe 89 PID 4044 set thread context of 1952 4044 omsecor.exe 112 PID 3676 set thread context of 4348 3676 omsecor.exe 116 -
Program crash 4 IoCs
pid pid_target Process procid_target 2732 1016 WerFault.exe 84 3104 3640 WerFault.exe 88 1560 4044 WerFault.exe 111 6132 3676 WerFault.exe 114 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1016 wrote to memory of 6088 1016 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 85 PID 1016 wrote to memory of 6088 1016 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 85 PID 1016 wrote to memory of 6088 1016 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 85 PID 1016 wrote to memory of 6088 1016 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 85 PID 1016 wrote to memory of 6088 1016 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 85 PID 6088 wrote to memory of 3640 6088 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 88 PID 6088 wrote to memory of 3640 6088 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 88 PID 6088 wrote to memory of 3640 6088 2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe 88 PID 3640 wrote to memory of 2384 3640 omsecor.exe 89 PID 3640 wrote to memory of 2384 3640 omsecor.exe 89 PID 3640 wrote to memory of 2384 3640 omsecor.exe 89 PID 3640 wrote to memory of 2384 3640 omsecor.exe 89 PID 3640 wrote to memory of 2384 3640 omsecor.exe 89 PID 2384 wrote to memory of 4044 2384 omsecor.exe 111 PID 2384 wrote to memory of 4044 2384 omsecor.exe 111 PID 2384 wrote to memory of 4044 2384 omsecor.exe 111 PID 4044 wrote to memory of 1952 4044 omsecor.exe 112 PID 4044 wrote to memory of 1952 4044 omsecor.exe 112 PID 4044 wrote to memory of 1952 4044 omsecor.exe 112 PID 4044 wrote to memory of 1952 4044 omsecor.exe 112 PID 4044 wrote to memory of 1952 4044 omsecor.exe 112 PID 1952 wrote to memory of 3676 1952 omsecor.exe 114 PID 1952 wrote to memory of 3676 1952 omsecor.exe 114 PID 1952 wrote to memory of 3676 1952 omsecor.exe 114 PID 3676 wrote to memory of 4348 3676 omsecor.exe 116 PID 3676 wrote to memory of 4348 3676 omsecor.exe 116 PID 3676 wrote to memory of 4348 3676 omsecor.exe 116 PID 3676 wrote to memory of 4348 3676 omsecor.exe 116 PID 3676 wrote to memory of 4348 3676 omsecor.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_af30f58b786b4b55b245824ea3353abb_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 2568⤵
- Program crash
PID:6132
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 2926⤵
- Program crash
PID:1560
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 2884⤵
- Program crash
PID:3104
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 2882⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1016 -ip 10161⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3640 -ip 36401⤵PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4044 -ip 40441⤵PID:2032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3676 -ip 36761⤵PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD573ae38c897592d51ddc356909b0c1c80
SHA1198578c7675af32742bd76bfdec3a74aeeac8298
SHA256d8d9eca1eb0d87c91b73187917d41d668db127659fd7dee654e559f25f94339b
SHA51267242b23a85c0675ba30ad15ce92cd3cafeb9a75c8613f5ead3b95621205ef711288cf8aa59172ed4145bc8625597bf9e3ff169ffd1585711530c13d2fd7fb00
-
Filesize
134KB
MD552adebc7a8f20b0e84374456029f86db
SHA1814a11afff672ebdb2dbccc739b0c6ea2f51a6fa
SHA256c40f1cb26585a75397b30ac5bc0cf7f66f1901280697bad0b7d34dbda958ac79
SHA512e64bc3c2a95215566643697ec1dffaf6a0f439f96059b16634652edfaa552dd09fa893f09e89e196daae5fbbc58e96491b69d4db421ed1702f3ee331b3890f19
-
Filesize
134KB
MD5880c7af210f7a0b24227a667e6413fcc
SHA1af48b79e042beca3953f3b008549e8b566dd645b
SHA2562288df1d26744aadb26b1493c68ee05a83b1f6f17fbeea78afda94a35ff62234
SHA512db88a4fa8f67da9aac2478892979fa2909b4b9ff5436f9b09217ebf5ccb917a7232deb6a20731f6f7c6d55e8ef550510db818645cf1cab2721fa1316abc27016