Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 20:36
Static task
static1
General
-
Target
2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
094567cf3d2dc5846bb3094eb4fbe2a2
-
SHA1
e9e16ac74b2c5a841a52e32e6f0d24ef4cf46b29
-
SHA256
12fae3b39f1462307894c608809a1b613c69523d3d0c15ecc7d5b0795278b300
-
SHA512
43b4a94cc4ad071eec62d6c6cc336cc1c7230e6b26a017982380949a3b5b7254f2c656f5f5ac5ce9fabd288a9c276a4970935fc1b00cfc9455a8b3efb0ea0444
-
SSDEEP
1536:1DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCif:ViRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 5292 omsecor.exe 3772 omsecor.exe 5500 omsecor.exe 4608 omsecor.exe 2604 omsecor.exe 1060 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4040 set thread context of 4372 4040 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 5292 set thread context of 3772 5292 omsecor.exe 92 PID 5500 set thread context of 4608 5500 omsecor.exe 122 PID 2604 set thread context of 1060 2604 omsecor.exe 126 -
Program crash 4 IoCs
pid pid_target Process procid_target 3700 4040 WerFault.exe 87 5892 5292 WerFault.exe 91 4828 5500 WerFault.exe 121 2144 2604 WerFault.exe 124 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4372 4040 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 4040 wrote to memory of 4372 4040 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 4040 wrote to memory of 4372 4040 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 4040 wrote to memory of 4372 4040 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 4040 wrote to memory of 4372 4040 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 4372 wrote to memory of 5292 4372 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 91 PID 4372 wrote to memory of 5292 4372 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 91 PID 4372 wrote to memory of 5292 4372 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 91 PID 5292 wrote to memory of 3772 5292 omsecor.exe 92 PID 5292 wrote to memory of 3772 5292 omsecor.exe 92 PID 5292 wrote to memory of 3772 5292 omsecor.exe 92 PID 5292 wrote to memory of 3772 5292 omsecor.exe 92 PID 5292 wrote to memory of 3772 5292 omsecor.exe 92 PID 3772 wrote to memory of 5500 3772 omsecor.exe 121 PID 3772 wrote to memory of 5500 3772 omsecor.exe 121 PID 3772 wrote to memory of 5500 3772 omsecor.exe 121 PID 5500 wrote to memory of 4608 5500 omsecor.exe 122 PID 5500 wrote to memory of 4608 5500 omsecor.exe 122 PID 5500 wrote to memory of 4608 5500 omsecor.exe 122 PID 5500 wrote to memory of 4608 5500 omsecor.exe 122 PID 5500 wrote to memory of 4608 5500 omsecor.exe 122 PID 4608 wrote to memory of 2604 4608 omsecor.exe 124 PID 4608 wrote to memory of 2604 4608 omsecor.exe 124 PID 4608 wrote to memory of 2604 4608 omsecor.exe 124 PID 2604 wrote to memory of 1060 2604 omsecor.exe 126 PID 2604 wrote to memory of 1060 2604 omsecor.exe 126 PID 2604 wrote to memory of 1060 2604 omsecor.exe 126 PID 2604 wrote to memory of 1060 2604 omsecor.exe 126 PID 2604 wrote to memory of 1060 2604 omsecor.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5292 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5500 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 2568⤵
- Program crash
PID:2144
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5500 -s 2926⤵
- Program crash
PID:4828
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5292 -s 2724⤵
- Program crash
PID:5892
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 2882⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4040 -ip 40401⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5292 -ip 52921⤵PID:5788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 5500 -ip 55001⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2604 -ip 26041⤵PID:2200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f0de6753efdb6c47dfbafc5323be2897
SHA15fc91d92bcdb013c51b17bd9970f84bf13a25fe8
SHA25626035f101816c679266be23035713fb135aca7f68dfeaa5a697f02dab5548b04
SHA51278a782a20911938a4d53534ec9e9ff5dff074936d86ccb06a7d395a8746c40a7dbea8ce1d453f62888b8400d62da76074e2523c6cdf513ccd309c9ed291c4c53
-
Filesize
134KB
MD5a88766ce782783e24b435dcc57468324
SHA161b30f1e72fd97ef62fd3fc586bdfd5b11464d66
SHA2564699937e692a086169332eb0e4ea83bf081ab9402dbdf6ee623f563eb551af12
SHA512f7286b0703cb742373ec91a7bf5f03400de9ab38591dd12b9d726aaf331227f7e3ae957f7b84a4aabc31275bb2dd389fc4cfa0fa0a18f0f6780674f3fb42e51b
-
Filesize
134KB
MD5c456a2a905fdb84cc1622d6c5992ce2c
SHA1fe34bf9523e1588b23c83819441e2edf7d8adb52
SHA2560b4f9506a7af518abf9544988ec819382f5ea02cdc640ef0452c37bba44357ce
SHA512239eede5326813b0b1b9721dce23e68e5e720b24eb9c5d6882845cbcdbf20e1e2741db918e67cda10f1ab4173c9879924a4ef19bbf421c0c40ebe7711a3361ce