Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 17:03
Static task
static1
General
-
Target
2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
f44a9d1fee0acdd0b45f6954374b4449
-
SHA1
8cac9ba608c56a05db3b1f22a92e91291633a80f
-
SHA256
5395db5ee6c99c19f231a88dbfb6bf73510c4ca908f2e54a673500f67ea7f6b2
-
SHA512
3e6e62705e59a1c789b4bdf5edc2c421fb3d8f4c30d017633b52a2810c9694af77529bc18279b6e0954578d7519595faed4498e7c8e55ee17726734d2d32afb7
-
SSDEEP
1536:GDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiV:4iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1524 omsecor.exe 1244 omsecor.exe 4300 omsecor.exe 2912 omsecor.exe 5772 omsecor.exe 2492 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 848 set thread context of 4224 848 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 86 PID 1524 set thread context of 1244 1524 omsecor.exe 90 PID 4300 set thread context of 2912 4300 omsecor.exe 114 PID 5772 set thread context of 2492 5772 omsecor.exe 118 -
Program crash 4 IoCs
pid pid_target Process procid_target 5792 848 WerFault.exe 85 5888 1524 WerFault.exe 88 368 4300 WerFault.exe 113 2264 5772 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 848 wrote to memory of 4224 848 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 86 PID 848 wrote to memory of 4224 848 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 86 PID 848 wrote to memory of 4224 848 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 86 PID 848 wrote to memory of 4224 848 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 86 PID 848 wrote to memory of 4224 848 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 86 PID 4224 wrote to memory of 1524 4224 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 88 PID 4224 wrote to memory of 1524 4224 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 88 PID 4224 wrote to memory of 1524 4224 2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe 88 PID 1524 wrote to memory of 1244 1524 omsecor.exe 90 PID 1524 wrote to memory of 1244 1524 omsecor.exe 90 PID 1524 wrote to memory of 1244 1524 omsecor.exe 90 PID 1524 wrote to memory of 1244 1524 omsecor.exe 90 PID 1524 wrote to memory of 1244 1524 omsecor.exe 90 PID 1244 wrote to memory of 4300 1244 omsecor.exe 113 PID 1244 wrote to memory of 4300 1244 omsecor.exe 113 PID 1244 wrote to memory of 4300 1244 omsecor.exe 113 PID 4300 wrote to memory of 2912 4300 omsecor.exe 114 PID 4300 wrote to memory of 2912 4300 omsecor.exe 114 PID 4300 wrote to memory of 2912 4300 omsecor.exe 114 PID 4300 wrote to memory of 2912 4300 omsecor.exe 114 PID 4300 wrote to memory of 2912 4300 omsecor.exe 114 PID 2912 wrote to memory of 5772 2912 omsecor.exe 116 PID 2912 wrote to memory of 5772 2912 omsecor.exe 116 PID 2912 wrote to memory of 5772 2912 omsecor.exe 116 PID 5772 wrote to memory of 2492 5772 omsecor.exe 118 PID 5772 wrote to memory of 2492 5772 omsecor.exe 118 PID 5772 wrote to memory of 2492 5772 omsecor.exe 118 PID 5772 wrote to memory of 2492 5772 omsecor.exe 118 PID 5772 wrote to memory of 2492 5772 omsecor.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_f44a9d1fee0acdd0b45f6954374b4449_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 2688⤵
- Program crash
PID:2264
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 2926⤵
- Program crash
PID:368
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 3004⤵
- Program crash
PID:5888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 2882⤵
- Program crash
PID:5792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 848 -ip 8481⤵PID:5500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1524 -ip 15241⤵PID:6116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4300 -ip 43001⤵PID:2796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5772 -ip 57721⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f80e9f3ff6162d021c5a62b7e25de64a
SHA14c434282b0d0fbf59eb19095dfe0d639090f9604
SHA256a76cca8a7b8ef40da78499ac46e532f2e1a53b76a1e15f0cbde27e7b858f1464
SHA512e0bea166f4b94c433dcdf456cce3f7f191dd94fd7955d9d0d6c71c93087d5e3b4329cd81cf23a153bb1c09b97639d27f8d4e064053516bb500feb969ffa7fe88
-
Filesize
134KB
MD5c7f10c3d094c17913f9bec9d19b4a52d
SHA14efe80226e7e15308df4fb25e8788e89cb55d9c4
SHA256c570befd4185b91701585855ec587ff75b6aadba349e9aa5ae068a494a83c42a
SHA5129b45ed46ec90354064b4d4f556b1b19d4ce52c4738d3d6fa26ced385fffbae2465ea7133b2173b22cd641443af7b510107d05b8d8cd6a2236a0e0cfa645ae7cb
-
Filesize
134KB
MD51fa86bff7e7017c5c819b4479df8c726
SHA1931cc9775f618cc8317d0ff0904e9f8363b3a4e7
SHA256429aea47126fb01a76d226642aeded43c96812d7b74c3f308ae2ec8725ee5ac9
SHA512806420fadbca003110424f879ea0edcd3793954b9ac038f3593adc8b0d2ff9b8d87d4dad0f50fcebdb241183e4109847f554566e952df04ca4048aa9828975cf