Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 18:18
Static task
static1
General
-
Target
2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
41528258392f55d7580451a0f4f2b5d3
-
SHA1
7f8a99facb60c29af631d9648f9f9aa48a5b79c6
-
SHA256
359a1786786b8e0b08c9c52666c51d7198880cfd8d43818d3a1a4e96bdcce8b9
-
SHA512
f33d086aeb53ab770a30535dfaa9feb056c99583e055e6670a282586f932aaa863d1579e53bd4a99c23d744eb335faa0416cbdf9a6994b41a5b59d7286379d98
-
SSDEEP
1536:EDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:aiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4556 omsecor.exe 4900 omsecor.exe 4584 omsecor.exe 4792 omsecor.exe 4820 omsecor.exe 5228 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5256 set thread context of 2476 5256 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 85 PID 4556 set thread context of 4900 4556 omsecor.exe 89 PID 4584 set thread context of 4792 4584 omsecor.exe 123 PID 4820 set thread context of 5228 4820 omsecor.exe 127 -
Program crash 4 IoCs
pid pid_target Process procid_target 4832 5256 WerFault.exe 84 5064 4556 WerFault.exe 87 4984 4584 WerFault.exe 122 4556 4820 WerFault.exe 125 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5256 wrote to memory of 2476 5256 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 85 PID 5256 wrote to memory of 2476 5256 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 85 PID 5256 wrote to memory of 2476 5256 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 85 PID 5256 wrote to memory of 2476 5256 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 85 PID 5256 wrote to memory of 2476 5256 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 85 PID 2476 wrote to memory of 4556 2476 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 87 PID 2476 wrote to memory of 4556 2476 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 87 PID 2476 wrote to memory of 4556 2476 2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe 87 PID 4556 wrote to memory of 4900 4556 omsecor.exe 89 PID 4556 wrote to memory of 4900 4556 omsecor.exe 89 PID 4556 wrote to memory of 4900 4556 omsecor.exe 89 PID 4556 wrote to memory of 4900 4556 omsecor.exe 89 PID 4556 wrote to memory of 4900 4556 omsecor.exe 89 PID 4900 wrote to memory of 4584 4900 omsecor.exe 122 PID 4900 wrote to memory of 4584 4900 omsecor.exe 122 PID 4900 wrote to memory of 4584 4900 omsecor.exe 122 PID 4584 wrote to memory of 4792 4584 omsecor.exe 123 PID 4584 wrote to memory of 4792 4584 omsecor.exe 123 PID 4584 wrote to memory of 4792 4584 omsecor.exe 123 PID 4584 wrote to memory of 4792 4584 omsecor.exe 123 PID 4584 wrote to memory of 4792 4584 omsecor.exe 123 PID 4792 wrote to memory of 4820 4792 omsecor.exe 125 PID 4792 wrote to memory of 4820 4792 omsecor.exe 125 PID 4792 wrote to memory of 4820 4792 omsecor.exe 125 PID 4820 wrote to memory of 5228 4820 omsecor.exe 127 PID 4820 wrote to memory of 5228 4820 omsecor.exe 127 PID 4820 wrote to memory of 5228 4820 omsecor.exe 127 PID 4820 wrote to memory of 5228 4820 omsecor.exe 127 PID 4820 wrote to memory of 5228 4820 omsecor.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5256 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_41528258392f55d7580451a0f4f2b5d3_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 2568⤵
- Program crash
PID:4556
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 2966⤵
- Program crash
PID:4984
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 2564⤵
- Program crash
PID:5064
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5256 -s 2762⤵
- Program crash
PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 5256 -ip 52561⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4556 -ip 45561⤵PID:744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4584 -ip 45841⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4820 -ip 48201⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5a8efae08cbadf7a2930ee06c2eb2776a
SHA1e772ffc08d9495dccbaaac34ead657a7cfbe25b9
SHA2566a7ea6f280c58d36c53201825ba7d4ece80e80a9caaf6fba953d90ff4235dd26
SHA51237e3334bc554e74fed2763ae6d3329cfc1bfd614737aa6297f00b219d4cd2977b4ed7e6ba5ac05e6fb3ffd7f9a2f1a5b857ea78357836256d43c61ed008500ef
-
Filesize
134KB
MD5e2e569327f5a5b67738d50879df035d1
SHA10dffa377658c659ebaf1f091a11560b1b7f386e7
SHA2560caded1c05101a361a9008ffa07b420cc70a2f3eefdb0c3c7483693c011074db
SHA51206f9a982a86ffd881f19487eb20a88d07397449c887feb9cbaaa615322501c88f16508d4d8398d09ef9e8cecad7c320b70fad293632efaefdc18b1551c66780c
-
Filesize
134KB
MD5bfa830323ed9541fea8223eda62ee472
SHA1b168503e8cce7d0f9368af7af6fcc3c4e8c7fc93
SHA2563353c9555a4836c6fa1f9e01c37381aa677bf82eba917ef14b913de386648c16
SHA51207f5e1fb41ed82b26b98e1b916b963e2641a1a6e85dcd5bfe2268c8112cdf0c9c07eeaac9b139675a31018a470b6033d4aa4304485b6edc39eca7df046b5e472