Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 19:50
Static task
static1
General
-
Target
2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
926e7027f6180d3610428d298ffda107
-
SHA1
163a8ae433596911d54ac95d96e0d3124be5c77e
-
SHA256
bff93a47851d016bbe2fa0e0953640d3cbb9dff7ed6eed29cb38848c87e6793c
-
SHA512
32be919a7baed025981cc58515d1d0a7af9df9e6b1a4af39a652cf08bb83d8c21e2411d1353d73896426df5f5ee8b0bce316fe9017114617f91fee9bda3b1a4a
-
SSDEEP
1536:3DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:TiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4188 omsecor.exe 1816 omsecor.exe 5672 omsecor.exe 1572 omsecor.exe 4500 omsecor.exe 3816 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 956 set thread context of 2696 956 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 87 PID 4188 set thread context of 1816 4188 omsecor.exe 91 PID 5672 set thread context of 1572 5672 omsecor.exe 117 PID 4500 set thread context of 3816 4500 omsecor.exe 120 -
Program crash 4 IoCs
pid pid_target Process procid_target 5316 4188 WerFault.exe 90 744 956 WerFault.exe 86 1472 5672 WerFault.exe 116 808 4500 WerFault.exe 119 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 956 wrote to memory of 2696 956 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 87 PID 956 wrote to memory of 2696 956 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 87 PID 956 wrote to memory of 2696 956 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 87 PID 956 wrote to memory of 2696 956 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 87 PID 956 wrote to memory of 2696 956 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 87 PID 2696 wrote to memory of 4188 2696 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 90 PID 2696 wrote to memory of 4188 2696 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 90 PID 2696 wrote to memory of 4188 2696 2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe 90 PID 4188 wrote to memory of 1816 4188 omsecor.exe 91 PID 4188 wrote to memory of 1816 4188 omsecor.exe 91 PID 4188 wrote to memory of 1816 4188 omsecor.exe 91 PID 4188 wrote to memory of 1816 4188 omsecor.exe 91 PID 4188 wrote to memory of 1816 4188 omsecor.exe 91 PID 1816 wrote to memory of 5672 1816 omsecor.exe 116 PID 1816 wrote to memory of 5672 1816 omsecor.exe 116 PID 1816 wrote to memory of 5672 1816 omsecor.exe 116 PID 5672 wrote to memory of 1572 5672 omsecor.exe 117 PID 5672 wrote to memory of 1572 5672 omsecor.exe 117 PID 5672 wrote to memory of 1572 5672 omsecor.exe 117 PID 5672 wrote to memory of 1572 5672 omsecor.exe 117 PID 5672 wrote to memory of 1572 5672 omsecor.exe 117 PID 1572 wrote to memory of 4500 1572 omsecor.exe 119 PID 1572 wrote to memory of 4500 1572 omsecor.exe 119 PID 1572 wrote to memory of 4500 1572 omsecor.exe 119 PID 4500 wrote to memory of 3816 4500 omsecor.exe 120 PID 4500 wrote to memory of 3816 4500 omsecor.exe 120 PID 4500 wrote to memory of 3816 4500 omsecor.exe 120 PID 4500 wrote to memory of 3816 4500 omsecor.exe 120 PID 4500 wrote to memory of 3816 4500 omsecor.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_926e7027f6180d3610428d298ffda107_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5672 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 2568⤵
- Program crash
PID:808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5672 -s 2926⤵
- Program crash
PID:1472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 3004⤵
- Program crash
PID:5316
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 2962⤵
- Program crash
PID:744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 956 -ip 9561⤵PID:5092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4188 -ip 41881⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5672 -ip 56721⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4500 -ip 45001⤵PID:1428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD569b33cb5bd45c2ed6c21f028ecd1f043
SHA1fcdb1151417b7b8c7a6034135de6487a01840229
SHA256a92d870997edd656e86e5c2edcc055310473e1a794afe58e3cb50502fb471fe2
SHA512af3220252e213aa7b1821a4d9fb7236f34e7cef34268d998a32e4152f9d424a32c176eed1233124729addaba064b3d0114ddc86d410d4f862dbe2481ba55a4fd
-
Filesize
134KB
MD51971cc2517f64b7d705a169c821da952
SHA1c4b192b9dc49695f3ffcccc823eb0254b86b7afa
SHA25678614fb5f4bf0c1dba81b53c91cd32e3e64e51b8bad1af9f9920487298dbcfb9
SHA5127925000f9a7cdbb5ed53d9c4c5f6469d1bd5f4ec606b59fa8c174711dad5acbb5bbc26e04b5f15796297fd6bbeba7822782509f9fde5e6c2c7e342797a4cac90
-
Filesize
134KB
MD5c5e6691c9bd4bde2619830031cd9c814
SHA116c0401432e1a1e0445fc5f98521a236e43d9b76
SHA25626812a11ab99036fb3c9e3eaaa53935c1f59aff71eb1aae446df910543ddd2d1
SHA5127a44bd5f7d9a92a0705266c7dc374cd4f7e427f3d9e194b98dd33b290bd3ebb7e5b5c647af0bb0539d6d6618824223ac9cd9b6f07b7303642623f197978d3c99