Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 21:16
Static task
static1
General
-
Target
2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
554f3d19271ede9e879b46bf17a167ff
-
SHA1
5804cdc3840e56e588725853a59b1d81ed662834
-
SHA256
351a74f471e88e187fa7e93e10de54e6c9d839a19da970b3ef097b86113e2fed
-
SHA512
e6bb1747ae9742ad582c6ed9c2362c730d51fcb168529a1a2b70487c3b365b81f35ac8524d25c871ee7513e50fab46178aa421805a3e96bd92e1ac872cde0b1e
-
SSDEEP
1536:7DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:3iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 232 omsecor.exe 2156 omsecor.exe 2056 omsecor.exe 3456 omsecor.exe 5364 omsecor.exe 2096 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4828 set thread context of 2432 4828 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 87 PID 232 set thread context of 2156 232 omsecor.exe 91 PID 2056 set thread context of 3456 2056 omsecor.exe 116 PID 5364 set thread context of 2096 5364 omsecor.exe 120 -
Program crash 4 IoCs
pid pid_target Process procid_target 1644 4828 WerFault.exe 86 220 232 WerFault.exe 89 1012 2056 WerFault.exe 115 2400 5364 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4828 wrote to memory of 2432 4828 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 87 PID 4828 wrote to memory of 2432 4828 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 87 PID 4828 wrote to memory of 2432 4828 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 87 PID 4828 wrote to memory of 2432 4828 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 87 PID 4828 wrote to memory of 2432 4828 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 87 PID 2432 wrote to memory of 232 2432 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 89 PID 2432 wrote to memory of 232 2432 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 89 PID 2432 wrote to memory of 232 2432 2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe 89 PID 232 wrote to memory of 2156 232 omsecor.exe 91 PID 232 wrote to memory of 2156 232 omsecor.exe 91 PID 232 wrote to memory of 2156 232 omsecor.exe 91 PID 232 wrote to memory of 2156 232 omsecor.exe 91 PID 232 wrote to memory of 2156 232 omsecor.exe 91 PID 2156 wrote to memory of 2056 2156 omsecor.exe 115 PID 2156 wrote to memory of 2056 2156 omsecor.exe 115 PID 2156 wrote to memory of 2056 2156 omsecor.exe 115 PID 2056 wrote to memory of 3456 2056 omsecor.exe 116 PID 2056 wrote to memory of 3456 2056 omsecor.exe 116 PID 2056 wrote to memory of 3456 2056 omsecor.exe 116 PID 2056 wrote to memory of 3456 2056 omsecor.exe 116 PID 2056 wrote to memory of 3456 2056 omsecor.exe 116 PID 3456 wrote to memory of 5364 3456 omsecor.exe 118 PID 3456 wrote to memory of 5364 3456 omsecor.exe 118 PID 3456 wrote to memory of 5364 3456 omsecor.exe 118 PID 5364 wrote to memory of 2096 5364 omsecor.exe 120 PID 5364 wrote to memory of 2096 5364 omsecor.exe 120 PID 5364 wrote to memory of 2096 5364 omsecor.exe 120 PID 5364 wrote to memory of 2096 5364 omsecor.exe 120 PID 5364 wrote to memory of 2096 5364 omsecor.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_554f3d19271ede9e879b46bf17a167ff_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5364 -s 2688⤵
- Program crash
PID:2400
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 2926⤵
- Program crash
PID:1012
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 2884⤵
- Program crash
PID:220
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 3002⤵
- Program crash
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4828 -ip 48281⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 232 -ip 2321⤵PID:5428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2056 -ip 20561⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5364 -ip 53641⤵PID:5440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD567fc6c7bba79346d0a6369fbd3d88d6e
SHA1202f2ecff764dac719e87e180bb29f7e6db9f3c9
SHA256facd6b9fbdedf264c96621d3393a3b9d2a78823063cbb6cec5d017e0ad74d7dd
SHA5126114a780f26a21f4ba87a081a2dbcfcc0d2829f8f3a57f2a88c9db440f086c4b1ff4fa61db33a7379732c7fa84879bf7331a7dc6f53f9288b04e26368b4a5afd
-
Filesize
134KB
MD52b4d4e05296cadf8d071e60b02901955
SHA13977004eb75253f02b5d73e2b1653d450fb64b45
SHA25608df7e06bcc14c53ec5e798dc99e0ee2db619981e9b11e92865017a55fa3357e
SHA512fd310bcb5df16004dea248d9efd748bd48096f70288bd8dd484d5a0248a15d71b7437536efaa0f065c88f85db18f11d4e0f25c1bd384fa51ad2ea586b05ccfa4
-
Filesize
134KB
MD5d93d97bcbcb5813f8798c47800171b0f
SHA1349822b3e40b1222fd4289d73e05ac041f1a8c07
SHA25615b2744d41d966f33dfed670d1e490536f2c863a56a9a0caaa5034299de00751
SHA512cb5cbaf6741b2930a209f68fda4628ad0cdad6cf9317db2184153a1f2dea70c53f40b7f44e7d4f9d163f33791136a2e76de2af815c28aac922e768fd6d010de5