Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 20:50
Static task
static1
General
-
Target
2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
28b4fdfa3417604c4d9c32ecf4f7d464
-
SHA1
fb13169b499148e76d6a6e9e3caa98bab573f5cb
-
SHA256
0cabd97389287b1c6b04ad471fd5c256a53650ca7a4fe4e6c4a8cb1b81c4a2b9
-
SHA512
b0c758c17ae83a070bde67fa086fbb7b1ff823c989a7717bc9ed492ac6ae1c373ec0ad1992cff56d1cf93f2652ab24302c0b9edc2a3058e4d8ecb2e209b4d4bb
-
SSDEEP
1536:CDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiP:0iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1996 omsecor.exe 3116 omsecor.exe 1288 omsecor.exe 5160 omsecor.exe 2344 omsecor.exe 704 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1664 set thread context of 5204 1664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 86 PID 1996 set thread context of 3116 1996 omsecor.exe 91 PID 1288 set thread context of 5160 1288 omsecor.exe 115 PID 2344 set thread context of 704 2344 omsecor.exe 119 -
Program crash 4 IoCs
pid pid_target Process procid_target 4424 1664 WerFault.exe 85 5144 1996 WerFault.exe 88 1576 1288 WerFault.exe 114 3900 2344 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1664 wrote to memory of 5204 1664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 86 PID 1664 wrote to memory of 5204 1664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 86 PID 1664 wrote to memory of 5204 1664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 86 PID 1664 wrote to memory of 5204 1664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 86 PID 1664 wrote to memory of 5204 1664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 86 PID 5204 wrote to memory of 1996 5204 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 88 PID 5204 wrote to memory of 1996 5204 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 88 PID 5204 wrote to memory of 1996 5204 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 88 PID 1996 wrote to memory of 3116 1996 omsecor.exe 91 PID 1996 wrote to memory of 3116 1996 omsecor.exe 91 PID 1996 wrote to memory of 3116 1996 omsecor.exe 91 PID 1996 wrote to memory of 3116 1996 omsecor.exe 91 PID 1996 wrote to memory of 3116 1996 omsecor.exe 91 PID 3116 wrote to memory of 1288 3116 omsecor.exe 114 PID 3116 wrote to memory of 1288 3116 omsecor.exe 114 PID 3116 wrote to memory of 1288 3116 omsecor.exe 114 PID 1288 wrote to memory of 5160 1288 omsecor.exe 115 PID 1288 wrote to memory of 5160 1288 omsecor.exe 115 PID 1288 wrote to memory of 5160 1288 omsecor.exe 115 PID 1288 wrote to memory of 5160 1288 omsecor.exe 115 PID 1288 wrote to memory of 5160 1288 omsecor.exe 115 PID 5160 wrote to memory of 2344 5160 omsecor.exe 117 PID 5160 wrote to memory of 2344 5160 omsecor.exe 117 PID 5160 wrote to memory of 2344 5160 omsecor.exe 117 PID 2344 wrote to memory of 704 2344 omsecor.exe 119 PID 2344 wrote to memory of 704 2344 omsecor.exe 119 PID 2344 wrote to memory of 704 2344 omsecor.exe 119 PID 2344 wrote to memory of 704 2344 omsecor.exe 119 PID 2344 wrote to memory of 704 2344 omsecor.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5204 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5160 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 2568⤵
- Program crash
PID:3900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 2926⤵
- Program crash
PID:1576
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2884⤵
- Program crash
PID:5144
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 2962⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1664 -ip 16641⤵PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1996 -ip 19961⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1288 -ip 12881⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2344 -ip 23441⤵PID:4308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD51b8b936711914ce6dfc13eda43e31407
SHA10400320e53d2bae3f2f69263d2ad4673a14f43c7
SHA2560e32e35f319da3b45218e1144b6f167051672d610095679877f64142bd7e8fb1
SHA512dc74908bfc734eddac2ed5c5ef7e768e8cdf814e4ded612542d3d47a704c8dc6a018e3dc394500f8a5a771ed8135baee341f84de6b4390a89d52535e7b0863be
-
Filesize
134KB
MD5fbca5b2d403263c8584dd0c39c1a0181
SHA12f210443d2c3adebce076e8bb24c73f148b916fa
SHA256222a222a3447913526eef4f8ff28d1b855201df3b8209d18507d70c8a6f86df0
SHA512bc4ed3c02d62c62c3ae2346829500a3efb632490ae012e7b123cadb47acbdc467b5a22454fbbe689ebb948a2bd25f86a39a4fe10cdfa1206361e1ad152893939
-
Filesize
134KB
MD5046294b627937e409f48aee734a4b20b
SHA16bcc9b1f946d9cbe97871447937715834290e94b
SHA256b1daae739deba31e68ce209546a7ae4169f329c8e4f3eda390e5c13dfe46d50d
SHA5127445b4db5ec45fa4d2937e62e761e6df6aaeffb8ea8cf17ae14c81a971903b6dba39c84361276560b56c47244df59d1329c1bdc94915aa11d1d132c53f318ce4