Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 21:11
Static task
static1
General
-
Target
2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
554f3d19271ede9e879b46bf17a167ff
-
SHA1
5804cdc3840e56e588725853a59b1d81ed662834
-
SHA256
351a74f471e88e187fa7e93e10de54e6c9d839a19da970b3ef097b86113e2fed
-
SHA512
e6bb1747ae9742ad582c6ed9c2362c730d51fcb168529a1a2b70487c3b365b81f35ac8524d25c871ee7513e50fab46178aa421805a3e96bd92e1ac872cde0b1e
-
SSDEEP
1536:7DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:3iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4352 omsecor.exe 3720 omsecor.exe 1796 omsecor.exe 4124 omsecor.exe 5652 omsecor.exe 3800 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3716 set thread context of 5600 3716 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 86 PID 4352 set thread context of 3720 4352 omsecor.exe 91 PID 1796 set thread context of 4124 1796 omsecor.exe 115 PID 5652 set thread context of 3800 5652 omsecor.exe 119 -
Program crash 4 IoCs
pid pid_target Process procid_target 5760 3716 WerFault.exe 85 4168 4352 WerFault.exe 88 5656 1796 WerFault.exe 114 5772 5652 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3716 wrote to memory of 5600 3716 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 86 PID 3716 wrote to memory of 5600 3716 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 86 PID 3716 wrote to memory of 5600 3716 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 86 PID 3716 wrote to memory of 5600 3716 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 86 PID 3716 wrote to memory of 5600 3716 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 86 PID 5600 wrote to memory of 4352 5600 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 88 PID 5600 wrote to memory of 4352 5600 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 88 PID 5600 wrote to memory of 4352 5600 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 88 PID 4352 wrote to memory of 3720 4352 omsecor.exe 91 PID 4352 wrote to memory of 3720 4352 omsecor.exe 91 PID 4352 wrote to memory of 3720 4352 omsecor.exe 91 PID 4352 wrote to memory of 3720 4352 omsecor.exe 91 PID 4352 wrote to memory of 3720 4352 omsecor.exe 91 PID 3720 wrote to memory of 1796 3720 omsecor.exe 114 PID 3720 wrote to memory of 1796 3720 omsecor.exe 114 PID 3720 wrote to memory of 1796 3720 omsecor.exe 114 PID 1796 wrote to memory of 4124 1796 omsecor.exe 115 PID 1796 wrote to memory of 4124 1796 omsecor.exe 115 PID 1796 wrote to memory of 4124 1796 omsecor.exe 115 PID 1796 wrote to memory of 4124 1796 omsecor.exe 115 PID 1796 wrote to memory of 4124 1796 omsecor.exe 115 PID 4124 wrote to memory of 5652 4124 omsecor.exe 117 PID 4124 wrote to memory of 5652 4124 omsecor.exe 117 PID 4124 wrote to memory of 5652 4124 omsecor.exe 117 PID 5652 wrote to memory of 3800 5652 omsecor.exe 119 PID 5652 wrote to memory of 3800 5652 omsecor.exe 119 PID 5652 wrote to memory of 3800 5652 omsecor.exe 119 PID 5652 wrote to memory of 3800 5652 omsecor.exe 119 PID 5652 wrote to memory of 3800 5652 omsecor.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5652 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 2688⤵
- Program crash
PID:5772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 2926⤵
- Program crash
PID:5656
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 3004⤵
- Program crash
PID:4168
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 3002⤵
- Program crash
PID:5760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3716 -ip 37161⤵PID:5400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4352 -ip 43521⤵PID:5800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1796 -ip 17961⤵PID:5408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5652 -ip 56521⤵PID:4376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD52b4d4e05296cadf8d071e60b02901955
SHA13977004eb75253f02b5d73e2b1653d450fb64b45
SHA25608df7e06bcc14c53ec5e798dc99e0ee2db619981e9b11e92865017a55fa3357e
SHA512fd310bcb5df16004dea248d9efd748bd48096f70288bd8dd484d5a0248a15d71b7437536efaa0f065c88f85db18f11d4e0f25c1bd384fa51ad2ea586b05ccfa4
-
Filesize
134KB
MD534f19885a7cd8047214613decc2264bf
SHA15335aa189b60c9daf38ee883600735a52a60b4fa
SHA256fa791b326b2e15be721c6ee7bdb87db310c59fbdf3faf5c2874cedb604858278
SHA5127f3a6d3ef51dc2da86f24a408e28d91c554f58b9c6b1b7db49110520db2e08a30a4f2247464bf11b2f849c5d11e596c586163180e6585659017914adaa0350d4
-
Filesize
134KB
MD5d18275a88f37da6152c89a12fa2741ee
SHA18224839864884b6ac91870c3d7cb7d26075fe1b0
SHA2567a12a125085b30b2d411891c8d444672a6fe6a16cd4db5f867e843487d9061fe
SHA512d074489d7daab1afa7635478a8009d07a5dc5e8368e037258229fac3d0ab180171a6cf362fb1e196b514b8c0286c81290f55802b180f11d23ba44355bac8e989