Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 21:14
Static task
static1
General
-
Target
2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
5a05a07ec79fa7c837682e7c7d7c74fd
-
SHA1
33ca9c1ab118729564f2d43ff9b5a51a328290be
-
SHA256
01e054d2ebfe1d081e04db8d37225d68e463115911323c309ec8f6f4312056b5
-
SHA512
24d6f951441edb11cf8b017d51114ef4998218a217e53cf89f94787063e380a14282da70919c765aef67aa43858240002cbf105d58fb572d1544e52b38a39d27
-
SSDEEP
1536:+DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:giRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 452 omsecor.exe 2644 omsecor.exe 4484 omsecor.exe 5720 omsecor.exe 1236 omsecor.exe 4304 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2352 set thread context of 2972 2352 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 87 PID 452 set thread context of 2644 452 omsecor.exe 92 PID 4484 set thread context of 5720 4484 omsecor.exe 116 PID 1236 set thread context of 4304 1236 omsecor.exe 120 -
Program crash 4 IoCs
pid pid_target Process procid_target 6128 2352 WerFault.exe 86 5736 452 WerFault.exe 90 4420 4484 WerFault.exe 115 3660 1236 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2972 2352 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 87 PID 2352 wrote to memory of 2972 2352 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 87 PID 2352 wrote to memory of 2972 2352 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 87 PID 2352 wrote to memory of 2972 2352 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 87 PID 2352 wrote to memory of 2972 2352 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 87 PID 2972 wrote to memory of 452 2972 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 90 PID 2972 wrote to memory of 452 2972 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 90 PID 2972 wrote to memory of 452 2972 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 90 PID 452 wrote to memory of 2644 452 omsecor.exe 92 PID 452 wrote to memory of 2644 452 omsecor.exe 92 PID 452 wrote to memory of 2644 452 omsecor.exe 92 PID 452 wrote to memory of 2644 452 omsecor.exe 92 PID 452 wrote to memory of 2644 452 omsecor.exe 92 PID 2644 wrote to memory of 4484 2644 omsecor.exe 115 PID 2644 wrote to memory of 4484 2644 omsecor.exe 115 PID 2644 wrote to memory of 4484 2644 omsecor.exe 115 PID 4484 wrote to memory of 5720 4484 omsecor.exe 116 PID 4484 wrote to memory of 5720 4484 omsecor.exe 116 PID 4484 wrote to memory of 5720 4484 omsecor.exe 116 PID 4484 wrote to memory of 5720 4484 omsecor.exe 116 PID 4484 wrote to memory of 5720 4484 omsecor.exe 116 PID 5720 wrote to memory of 1236 5720 omsecor.exe 118 PID 5720 wrote to memory of 1236 5720 omsecor.exe 118 PID 5720 wrote to memory of 1236 5720 omsecor.exe 118 PID 1236 wrote to memory of 4304 1236 omsecor.exe 120 PID 1236 wrote to memory of 4304 1236 omsecor.exe 120 PID 1236 wrote to memory of 4304 1236 omsecor.exe 120 PID 1236 wrote to memory of 4304 1236 omsecor.exe 120 PID 1236 wrote to memory of 4304 1236 omsecor.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 2688⤵
- Program crash
PID:3660
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 3006⤵
- Program crash
PID:4420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 3004⤵
- Program crash
PID:5736
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 2882⤵
- Program crash
PID:6128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2352 -ip 23521⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 452 -ip 4521⤵PID:6104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4484 -ip 44841⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1236 -ip 12361⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD52c67019f5e7a93adc4d2033b9d2a5dfc
SHA180b45aa958aa894a408f2f662e935347c85606db
SHA256d969b7cc2bdf2e1f23db3c81e6e02153efea9435c298cdf81911369bd2b55d65
SHA512088f1dd4814431749c33665a00d8820a6e8a8676e8f85b813ec431b04eeb0efd37395a77fdeb5450df047119e437ace7c3cc36630411f22ee3ee0288ded26ead
-
Filesize
134KB
MD5860b66decca8923aaa7efd2898372ad0
SHA1d26c180641cd2b93e10de4d56c8acb660ecea71e
SHA256e881ae43ee8e84924bbe87f41783f9406cbb2ec12c923ede7fb14719e83c01ef
SHA5120c436e048e0fb0b76011685a30260331f646cebe0f8a60e5f27d60e46d4a884d10cdd7608c9459ab10bd04a3901c3ebd15b8cdb00a8b2c11f771413797f01659
-
Filesize
134KB
MD5260bcb3e2061eb3ddb1b8d29fd4aa488
SHA1395972836f5ea71ffefdedb8edb4ff7c2a3ee837
SHA25677a45c4d79d1b753e8222dfcc53831e096582017ebfdc1abdc2b8300d4b8537f
SHA512c792b1a6a7d4606cf54831f2ebcf0c0ffeab634cff02cc89c93f0515c2c2f2abfd9ecaf104c0e237a87e11082338bad210ccfa5ab2eeac5fb4384d3010c02d8a