Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 21:19
Static task
static1
General
-
Target
2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
5a05a07ec79fa7c837682e7c7d7c74fd
-
SHA1
33ca9c1ab118729564f2d43ff9b5a51a328290be
-
SHA256
01e054d2ebfe1d081e04db8d37225d68e463115911323c309ec8f6f4312056b5
-
SHA512
24d6f951441edb11cf8b017d51114ef4998218a217e53cf89f94787063e380a14282da70919c765aef67aa43858240002cbf105d58fb572d1544e52b38a39d27
-
SSDEEP
1536:+DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:giRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2500 omsecor.exe 2664 omsecor.exe 5616 omsecor.exe 3268 omsecor.exe 4304 omsecor.exe 1732 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3028 set thread context of 5456 3028 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 85 PID 2500 set thread context of 2664 2500 omsecor.exe 90 PID 5616 set thread context of 3268 5616 omsecor.exe 115 PID 4304 set thread context of 1732 4304 omsecor.exe 118 -
Program crash 4 IoCs
pid pid_target Process procid_target 2020 3028 WerFault.exe 84 5252 2500 WerFault.exe 88 3820 5616 WerFault.exe 114 4588 4304 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3028 wrote to memory of 5456 3028 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 85 PID 3028 wrote to memory of 5456 3028 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 85 PID 3028 wrote to memory of 5456 3028 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 85 PID 3028 wrote to memory of 5456 3028 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 85 PID 3028 wrote to memory of 5456 3028 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 85 PID 5456 wrote to memory of 2500 5456 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 88 PID 5456 wrote to memory of 2500 5456 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 88 PID 5456 wrote to memory of 2500 5456 2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe 88 PID 2500 wrote to memory of 2664 2500 omsecor.exe 90 PID 2500 wrote to memory of 2664 2500 omsecor.exe 90 PID 2500 wrote to memory of 2664 2500 omsecor.exe 90 PID 2500 wrote to memory of 2664 2500 omsecor.exe 90 PID 2500 wrote to memory of 2664 2500 omsecor.exe 90 PID 2664 wrote to memory of 5616 2664 omsecor.exe 114 PID 2664 wrote to memory of 5616 2664 omsecor.exe 114 PID 2664 wrote to memory of 5616 2664 omsecor.exe 114 PID 5616 wrote to memory of 3268 5616 omsecor.exe 115 PID 5616 wrote to memory of 3268 5616 omsecor.exe 115 PID 5616 wrote to memory of 3268 5616 omsecor.exe 115 PID 5616 wrote to memory of 3268 5616 omsecor.exe 115 PID 5616 wrote to memory of 3268 5616 omsecor.exe 115 PID 3268 wrote to memory of 4304 3268 omsecor.exe 117 PID 3268 wrote to memory of 4304 3268 omsecor.exe 117 PID 3268 wrote to memory of 4304 3268 omsecor.exe 117 PID 4304 wrote to memory of 1732 4304 omsecor.exe 118 PID 4304 wrote to memory of 1732 4304 omsecor.exe 118 PID 4304 wrote to memory of 1732 4304 omsecor.exe 118 PID 4304 wrote to memory of 1732 4304 omsecor.exe 118 PID 4304 wrote to memory of 1732 4304 omsecor.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_5a05a07ec79fa7c837682e7c7d7c74fd_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5616 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 2568⤵
- Program crash
PID:4588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5616 -s 3006⤵
- Program crash
PID:3820
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 3004⤵
- Program crash
PID:5252
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3028 -s 2922⤵
- Program crash
PID:2020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3028 -ip 30281⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2500 -ip 25001⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5616 -ip 56161⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4304 -ip 43041⤵PID:5844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5a335754256345286db25ecee09ce776b
SHA166f92b27888fda4418e6a8710b066da23f7764fc
SHA256586a2792089fa06d0795a89a30d3a46dbc16c1e134983c77c4165f3c6518fa7c
SHA5120fe9fdfca65b5d4e2e9cd5c79efe701807260a910c0cb6a9c9138f0bc0f296ba1a26da2823c9cbfdcbda4cc4ac4084d4eb200e593ce4c0627565fcca2a42fbf1
-
Filesize
134KB
MD5860b66decca8923aaa7efd2898372ad0
SHA1d26c180641cd2b93e10de4d56c8acb660ecea71e
SHA256e881ae43ee8e84924bbe87f41783f9406cbb2ec12c923ede7fb14719e83c01ef
SHA5120c436e048e0fb0b76011685a30260331f646cebe0f8a60e5f27d60e46d4a884d10cdd7608c9459ab10bd04a3901c3ebd15b8cdb00a8b2c11f771413797f01659
-
Filesize
134KB
MD56409f06149605982d6949a0ef09bc614
SHA16e595d2e1b2b87e0805e78ff72b134b1d8516bd7
SHA256379820677cebd80307ca97ddb680b8470a406b46d17939cac9b3fb0cb4c73b99
SHA512753cddfd4145c56d0372271b9bf972fb5268238817237e20d354120a1b568e98c5ce7e0784d202315a97747e4aa141190731c794284afd6acd5ba6f09bb6e75e