Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 20:33
Static task
static1
General
-
Target
2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
02111f1d8a19dae5623150f5fbaee01d
-
SHA1
e96d5b999c7291febd9559a899ce00885ccfa4ac
-
SHA256
505439074ce29ddb3cbead3bfadd94aa11b0bda195f1ebc22ad9b16a9516558d
-
SHA512
9d043adb77bdd6f02c0810fc931446344c425d3aad6d7fd99b8ce9e5a42b820dd509689fa11eefa891f6b439fb1c01d2e848940a9d0a81bae68ac28c2861c66f
-
SSDEEP
1536:2DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:oiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3884 omsecor.exe 1020 omsecor.exe 5064 omsecor.exe 3748 omsecor.exe 1892 omsecor.exe 1412 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 264 set thread context of 5004 264 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 88 PID 3884 set thread context of 1020 3884 omsecor.exe 92 PID 5064 set thread context of 3748 5064 omsecor.exe 118 PID 1892 set thread context of 1412 1892 omsecor.exe 122 -
Program crash 4 IoCs
pid pid_target Process procid_target 216 264 WerFault.exe 87 852 3884 WerFault.exe 91 2296 5064 WerFault.exe 117 3792 1892 WerFault.exe 120 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 264 wrote to memory of 5004 264 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 88 PID 264 wrote to memory of 5004 264 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 88 PID 264 wrote to memory of 5004 264 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 88 PID 264 wrote to memory of 5004 264 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 88 PID 264 wrote to memory of 5004 264 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 88 PID 5004 wrote to memory of 3884 5004 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 91 PID 5004 wrote to memory of 3884 5004 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 91 PID 5004 wrote to memory of 3884 5004 2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe 91 PID 3884 wrote to memory of 1020 3884 omsecor.exe 92 PID 3884 wrote to memory of 1020 3884 omsecor.exe 92 PID 3884 wrote to memory of 1020 3884 omsecor.exe 92 PID 3884 wrote to memory of 1020 3884 omsecor.exe 92 PID 3884 wrote to memory of 1020 3884 omsecor.exe 92 PID 1020 wrote to memory of 5064 1020 omsecor.exe 117 PID 1020 wrote to memory of 5064 1020 omsecor.exe 117 PID 1020 wrote to memory of 5064 1020 omsecor.exe 117 PID 5064 wrote to memory of 3748 5064 omsecor.exe 118 PID 5064 wrote to memory of 3748 5064 omsecor.exe 118 PID 5064 wrote to memory of 3748 5064 omsecor.exe 118 PID 5064 wrote to memory of 3748 5064 omsecor.exe 118 PID 5064 wrote to memory of 3748 5064 omsecor.exe 118 PID 3748 wrote to memory of 1892 3748 omsecor.exe 120 PID 3748 wrote to memory of 1892 3748 omsecor.exe 120 PID 3748 wrote to memory of 1892 3748 omsecor.exe 120 PID 1892 wrote to memory of 1412 1892 omsecor.exe 122 PID 1892 wrote to memory of 1412 1892 omsecor.exe 122 PID 1892 wrote to memory of 1412 1892 omsecor.exe 122 PID 1892 wrote to memory of 1412 1892 omsecor.exe 122 PID 1892 wrote to memory of 1412 1892 omsecor.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_02111f1d8a19dae5623150f5fbaee01d_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 2608⤵
- Program crash
PID:3792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 2926⤵
- Program crash
PID:2296
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 3044⤵
- Program crash
PID:852
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 2882⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 264 -ip 2641⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3884 -ip 38841⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 5064 -ip 50641⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1892 -ip 18921⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56f920f94d305990fb2c8ef10bec7714c
SHA105a7b39b7e3b7db0fa1fa17b8daecc7d923e4bbe
SHA25670de129d070163e3aedbede02b9b3c9750dd584d6cecec0b0f994ba70ae3dbe9
SHA512d390400f34dbd49380c0401349445e599330dc4f177ffc55dd2616de04045429cb903b4d390ba6bbacbf5fafcfdd0be5af81c689fbd8dfa3fd11c427d07340a9
-
Filesize
134KB
MD57dc70ea8840f5b51319e551da0aad186
SHA15735407183969d599db5fdae6348869000a8960e
SHA2560dd629066f09e93d469e8847bc7bb20b11a4519f43822a47c42233966f09d5b8
SHA512884987df3623f0007e34d1cc9674000bf80f54b4ef37839cac03167c98274a0802029ea00c90c4e1f9307f5d7342eb493c353346093da6504b5320217ad79442
-
Filesize
134KB
MD5b35b000af559e056bf78e6ba88fb1e91
SHA16d85a5440c2c6be2cf1f3eecb1ce45a496ddc009
SHA25600ae2d752c9fe7bf714228b38e629b7fb5da421664ee7a59b227b1e5f0922aaa
SHA512f8c0ccd66b4f2f95080d6604a06f234c16999b2645dbdceda156a7aa7dc9e0f8b302fc19f49f710087f109365d1d85f368bc5818a5f9b643d682428a303f5cff