Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 19:25
Static task
static1
General
-
Target
2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
b4cf099006761ced4130334ae8ef0f2a
-
SHA1
0b2ce9a9958243479819f8580e8fbc9fb729cadd
-
SHA256
3766d62b23c594db67a171d7d8b276ee82f9d64fea7d98f7e65b9b8e179dedbf
-
SHA512
3c12bc2aff13da4839464c2b0c463dc21d1dfeee581366828ff986256672b713df5ce31efa0d86289a2e205c477d9e59b38ffaf73c25e2cfcaf2a0e5e2e1ae2e
-
SSDEEP
1536:SDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:EiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4536 omsecor.exe 4240 omsecor.exe 1572 omsecor.exe 3624 omsecor.exe 444 omsecor.exe 2040 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 6132 set thread context of 5844 6132 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 85 PID 4536 set thread context of 4240 4536 omsecor.exe 90 PID 1572 set thread context of 3624 1572 omsecor.exe 110 PID 444 set thread context of 2040 444 omsecor.exe 114 -
Program crash 4 IoCs
pid pid_target Process procid_target 5964 6132 WerFault.exe 84 5596 4536 WerFault.exe 88 2392 1572 WerFault.exe 109 3408 444 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 6132 wrote to memory of 5844 6132 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 85 PID 6132 wrote to memory of 5844 6132 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 85 PID 6132 wrote to memory of 5844 6132 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 85 PID 6132 wrote to memory of 5844 6132 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 85 PID 6132 wrote to memory of 5844 6132 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 85 PID 5844 wrote to memory of 4536 5844 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 88 PID 5844 wrote to memory of 4536 5844 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 88 PID 5844 wrote to memory of 4536 5844 2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe 88 PID 4536 wrote to memory of 4240 4536 omsecor.exe 90 PID 4536 wrote to memory of 4240 4536 omsecor.exe 90 PID 4536 wrote to memory of 4240 4536 omsecor.exe 90 PID 4536 wrote to memory of 4240 4536 omsecor.exe 90 PID 4536 wrote to memory of 4240 4536 omsecor.exe 90 PID 4240 wrote to memory of 1572 4240 omsecor.exe 109 PID 4240 wrote to memory of 1572 4240 omsecor.exe 109 PID 4240 wrote to memory of 1572 4240 omsecor.exe 109 PID 1572 wrote to memory of 3624 1572 omsecor.exe 110 PID 1572 wrote to memory of 3624 1572 omsecor.exe 110 PID 1572 wrote to memory of 3624 1572 omsecor.exe 110 PID 1572 wrote to memory of 3624 1572 omsecor.exe 110 PID 1572 wrote to memory of 3624 1572 omsecor.exe 110 PID 3624 wrote to memory of 444 3624 omsecor.exe 112 PID 3624 wrote to memory of 444 3624 omsecor.exe 112 PID 3624 wrote to memory of 444 3624 omsecor.exe 112 PID 444 wrote to memory of 2040 444 omsecor.exe 114 PID 444 wrote to memory of 2040 444 omsecor.exe 114 PID 444 wrote to memory of 2040 444 omsecor.exe 114 PID 444 wrote to memory of 2040 444 omsecor.exe 114 PID 444 wrote to memory of 2040 444 omsecor.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6132 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_b4cf099006761ced4130334ae8ef0f2a_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5844 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 2568⤵
- Program crash
PID:3408
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 2926⤵
- Program crash
PID:2392
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 2884⤵
- Program crash
PID:5596
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6132 -s 2882⤵
- Program crash
PID:5964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 6132 -ip 61321⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4536 -ip 45361⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1572 -ip 15721⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 444 -ip 4441⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5d4d28fd5ffde77813be4a4f758ed7f7c
SHA1d25a8551f434bd1b4d1400ac62581f7ab81034be
SHA256e1db5ee3c31dbfc95cf20eeca7e76bb2de1e73176f15bd0b1cc1987f1bc86aae
SHA5120f315d84ec79317e9965600a055c67ba62c27bec3209da02f636fa3c0112d9e6c6eec80f5b75abfc03ec706ee5aa8a15220fa7a5a8b2fc8ac58929ae04acfbc5
-
Filesize
134KB
MD5dc7a833f8a7f035ca0e2b6359ceea716
SHA143382e06877f25067b3068528fbd36a73b7b68ce
SHA2563b36344499f87e3e74f4ac3d2d03527d2fc3cec061c24534577dbfedbaa72948
SHA5125d7818ea02cfa759a2478af427e9614d0e13c41e56a7bb7a255b6197798c42518ab98a56767efbc15fbd9dbca094d382aac8353b0f17e06e2b28278a5935a7b4
-
Filesize
134KB
MD55e90ccbf0463d8810711e34899280157
SHA17f6c0d7d4f14361bb1784e97448d94bdff6a89ec
SHA256a1f24cd693443be5f5488c9450758eadc82fdd7a8a1d271f08876fd61a2ddc83
SHA51230dd901329eb010a7d0a62d32f31950848b2937dc72ede7bed1316461b3ba5a157b2c406575a7e1ec90cb5ef6d961f6eb44f9d18db8737f40e54b322ca74040c