Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 20:35
Static task
static1
General
-
Target
2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
07110c5f5539229244022b8504647cae
-
SHA1
7b4672e82ed80f3baa45347e97e8cec0c09d81ef
-
SHA256
42d498e51e689744b4a116ca8c1ef64abf9dbc8a03dab9e2f6451a0cdf927d1d
-
SHA512
8d11e6151194ed88f17befd24f266a243ad3391b75d491125a93fa674b0f9ad6abf3e53f094cfa200d3ff2c8c54b277df23ab8c9855a0026222ade3a05525391
-
SSDEEP
1536:rDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:niRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2156 omsecor.exe 2240 omsecor.exe 4592 omsecor.exe 3864 omsecor.exe 1652 omsecor.exe 3096 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2212 set thread context of 3188 2212 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 87 PID 2156 set thread context of 2240 2156 omsecor.exe 92 PID 4592 set thread context of 3864 4592 omsecor.exe 118 PID 1652 set thread context of 3096 1652 omsecor.exe 121 -
Program crash 4 IoCs
pid pid_target Process procid_target 2136 2212 WerFault.exe 86 2428 2156 WerFault.exe 90 2004 4592 WerFault.exe 117 2000 1652 WerFault.exe 120 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3188 2212 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 87 PID 2212 wrote to memory of 3188 2212 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 87 PID 2212 wrote to memory of 3188 2212 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 87 PID 2212 wrote to memory of 3188 2212 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 87 PID 2212 wrote to memory of 3188 2212 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 87 PID 3188 wrote to memory of 2156 3188 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 90 PID 3188 wrote to memory of 2156 3188 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 90 PID 3188 wrote to memory of 2156 3188 2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe 90 PID 2156 wrote to memory of 2240 2156 omsecor.exe 92 PID 2156 wrote to memory of 2240 2156 omsecor.exe 92 PID 2156 wrote to memory of 2240 2156 omsecor.exe 92 PID 2156 wrote to memory of 2240 2156 omsecor.exe 92 PID 2156 wrote to memory of 2240 2156 omsecor.exe 92 PID 2240 wrote to memory of 4592 2240 omsecor.exe 117 PID 2240 wrote to memory of 4592 2240 omsecor.exe 117 PID 2240 wrote to memory of 4592 2240 omsecor.exe 117 PID 4592 wrote to memory of 3864 4592 omsecor.exe 118 PID 4592 wrote to memory of 3864 4592 omsecor.exe 118 PID 4592 wrote to memory of 3864 4592 omsecor.exe 118 PID 4592 wrote to memory of 3864 4592 omsecor.exe 118 PID 4592 wrote to memory of 3864 4592 omsecor.exe 118 PID 3864 wrote to memory of 1652 3864 omsecor.exe 120 PID 3864 wrote to memory of 1652 3864 omsecor.exe 120 PID 3864 wrote to memory of 1652 3864 omsecor.exe 120 PID 1652 wrote to memory of 3096 1652 omsecor.exe 121 PID 1652 wrote to memory of 3096 1652 omsecor.exe 121 PID 1652 wrote to memory of 3096 1652 omsecor.exe 121 PID 1652 wrote to memory of 3096 1652 omsecor.exe 121 PID 1652 wrote to memory of 3096 1652 omsecor.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_07110c5f5539229244022b8504647cae_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 2688⤵
- Program crash
PID:2000
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 2966⤵
- Program crash
PID:2004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 2884⤵
- Program crash
PID:2428
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 2882⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2212 -ip 22121⤵PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2156 -ip 21561⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4592 -ip 45921⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1652 -ip 16521⤵PID:4876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5ab300ce732b6563e158c4d32b8cd5e1a
SHA18dadbd6cb88c4f7cc2ad1105feec2a9fd176f34e
SHA2560b8de4106f2cc5b013ec637962e1cf7f7e259cae2bf25a9a7c87529e5462c7e3
SHA512dd80f47d34c411c0055e328f30ee4ce1797c15e9d41598b797e72f74d1afb1190a1d24b85f7fa9cf137e7ed38206464bd3532ff9d668e3ea85c20e2efc33163b
-
Filesize
134KB
MD54837742a9f5879beaedd37da71534ecc
SHA1e4e0eaa8aa54033822f7e79cf68e5fdca0ddfd65
SHA2564312146fc114b7e8fa5fdf35448ed3b90aa4c52d7efa6789de725ac96304fdfe
SHA5124237c0198516b6f98eff7c81b9033e5ca2605876ded4ec7fa3684844fa2fbe3ec2900221100bc7632add473e76d5b9f2469bfe94aa0f42c8847a7800c14ddcf3
-
Filesize
134KB
MD59f34604056a294238671e6fd3ea3b439
SHA196eb92664b5dcc1a87091d03eaf9e88cdda69501
SHA2562d4201ac11dc875725d178b58b4bea1c036b5cc977cba7c3fc429710660cf9a9
SHA512e1368244cb935d77426624ae07a5b2ac11c88436037042dfa3f3579609aff8f0443b2b1a9ec9d26fa7154eb440f812126db294dec226085d030955230484c87d