Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 20:44
Static task
static1
General
-
Target
2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
094567cf3d2dc5846bb3094eb4fbe2a2
-
SHA1
e9e16ac74b2c5a841a52e32e6f0d24ef4cf46b29
-
SHA256
12fae3b39f1462307894c608809a1b613c69523d3d0c15ecc7d5b0795278b300
-
SHA512
43b4a94cc4ad071eec62d6c6cc336cc1c7230e6b26a017982380949a3b5b7254f2c656f5f5ac5ce9fabd288a9c276a4970935fc1b00cfc9455a8b3efb0ea0444
-
SSDEEP
1536:1DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCif:ViRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 404 omsecor.exe 2316 omsecor.exe 4436 omsecor.exe 1140 omsecor.exe 552 omsecor.exe 5072 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5468 set thread context of 5928 5468 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 404 set thread context of 2316 404 omsecor.exe 93 PID 4436 set thread context of 1140 4436 omsecor.exe 118 PID 552 set thread context of 5072 552 omsecor.exe 122 -
Program crash 4 IoCs
pid pid_target Process procid_target 3432 5468 WerFault.exe 87 5472 404 WerFault.exe 91 3544 4436 WerFault.exe 117 6040 552 WerFault.exe 120 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5468 wrote to memory of 5928 5468 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 5468 wrote to memory of 5928 5468 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 5468 wrote to memory of 5928 5468 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 5468 wrote to memory of 5928 5468 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 5468 wrote to memory of 5928 5468 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 88 PID 5928 wrote to memory of 404 5928 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 91 PID 5928 wrote to memory of 404 5928 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 91 PID 5928 wrote to memory of 404 5928 2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe 91 PID 404 wrote to memory of 2316 404 omsecor.exe 93 PID 404 wrote to memory of 2316 404 omsecor.exe 93 PID 404 wrote to memory of 2316 404 omsecor.exe 93 PID 404 wrote to memory of 2316 404 omsecor.exe 93 PID 404 wrote to memory of 2316 404 omsecor.exe 93 PID 2316 wrote to memory of 4436 2316 omsecor.exe 117 PID 2316 wrote to memory of 4436 2316 omsecor.exe 117 PID 2316 wrote to memory of 4436 2316 omsecor.exe 117 PID 4436 wrote to memory of 1140 4436 omsecor.exe 118 PID 4436 wrote to memory of 1140 4436 omsecor.exe 118 PID 4436 wrote to memory of 1140 4436 omsecor.exe 118 PID 4436 wrote to memory of 1140 4436 omsecor.exe 118 PID 4436 wrote to memory of 1140 4436 omsecor.exe 118 PID 1140 wrote to memory of 552 1140 omsecor.exe 120 PID 1140 wrote to memory of 552 1140 omsecor.exe 120 PID 1140 wrote to memory of 552 1140 omsecor.exe 120 PID 552 wrote to memory of 5072 552 omsecor.exe 122 PID 552 wrote to memory of 5072 552 omsecor.exe 122 PID 552 wrote to memory of 5072 552 omsecor.exe 122 PID 552 wrote to memory of 5072 552 omsecor.exe 122 PID 552 wrote to memory of 5072 552 omsecor.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5468 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_094567cf3d2dc5846bb3094eb4fbe2a2_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 2568⤵
- Program crash
PID:6040
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 2926⤵
- Program crash
PID:3544
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 2884⤵
- Program crash
PID:5472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5468 -s 2882⤵
- Program crash
PID:3432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5468 -ip 54681⤵PID:4184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 404 -ip 4041⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4436 -ip 44361⤵PID:5608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 552 -ip 5521⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5dac203fb9b4950752206e264715c4337
SHA11409fb3a938ff7366520cc253feeab43d3cc0c60
SHA2565d097cf728c23037eade917e256e7095c9409cd9d20e620454c5cebd52ad47c9
SHA5121a62fa62995abb094998e8aee81259fa7fc6c308e6afffd1cb081492ff377bfd98d159f2223cd403b1fe99f3abfab53709850724b21b07b4ad8b5c6c43856925
-
Filesize
134KB
MD5a88766ce782783e24b435dcc57468324
SHA161b30f1e72fd97ef62fd3fc586bdfd5b11464d66
SHA2564699937e692a086169332eb0e4ea83bf081ab9402dbdf6ee623f563eb551af12
SHA512f7286b0703cb742373ec91a7bf5f03400de9ab38591dd12b9d726aaf331227f7e3ae957f7b84a4aabc31275bb2dd389fc4cfa0fa0a18f0f6780674f3fb42e51b
-
Filesize
134KB
MD5621761a9604d1774625c320d32bc506e
SHA1d84456be6f0fcc1c2b4873d03ae8ee51d313a541
SHA25658d50b571279a0c65973490dbd9954f6f481c6e3f89741ccf3ef1abfd45b4cb9
SHA51275ff45f8b531953686f1990adbf7f9f8291e05d998aaec4a1d7b351a1be579add06c4bd0b3311a99ef8f0cc12886b99cfb5bc19df655b44d65667416499fc7fe