Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 20:54
Static task
static1
General
-
Target
2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
300088abd70550ddefce857e37c1ba2e
-
SHA1
e243b0ed9f0a8cf888ba591ef2a6e5ff0abd492e
-
SHA256
640d0ededb1cedba28d013576c155618ea578564ff4925739de0bc5dbc0e48c0
-
SHA512
3eedb4873e9f14fce053489ec72ffdf54d8ada364811c59fd6b249093c2ea598305b61bbc6bef523b65f66d5a3de8110640f792164da479665159433a56ae8ec
-
SSDEEP
1536:VDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:1iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 692 omsecor.exe 2756 omsecor.exe 4120 omsecor.exe 2472 omsecor.exe 512 omsecor.exe 1276 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3300 set thread context of 1816 3300 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 87 PID 692 set thread context of 2756 692 omsecor.exe 92 PID 4120 set thread context of 2472 4120 omsecor.exe 120 PID 512 set thread context of 1276 512 omsecor.exe 124 -
Program crash 4 IoCs
pid pid_target Process procid_target 3044 3300 WerFault.exe 86 2280 692 WerFault.exe 89 4304 4120 WerFault.exe 119 4188 512 WerFault.exe 122 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3300 wrote to memory of 1816 3300 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 87 PID 3300 wrote to memory of 1816 3300 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 87 PID 3300 wrote to memory of 1816 3300 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 87 PID 3300 wrote to memory of 1816 3300 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 87 PID 3300 wrote to memory of 1816 3300 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 87 PID 1816 wrote to memory of 692 1816 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 89 PID 1816 wrote to memory of 692 1816 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 89 PID 1816 wrote to memory of 692 1816 2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe 89 PID 692 wrote to memory of 2756 692 omsecor.exe 92 PID 692 wrote to memory of 2756 692 omsecor.exe 92 PID 692 wrote to memory of 2756 692 omsecor.exe 92 PID 692 wrote to memory of 2756 692 omsecor.exe 92 PID 692 wrote to memory of 2756 692 omsecor.exe 92 PID 2756 wrote to memory of 4120 2756 omsecor.exe 119 PID 2756 wrote to memory of 4120 2756 omsecor.exe 119 PID 2756 wrote to memory of 4120 2756 omsecor.exe 119 PID 4120 wrote to memory of 2472 4120 omsecor.exe 120 PID 4120 wrote to memory of 2472 4120 omsecor.exe 120 PID 4120 wrote to memory of 2472 4120 omsecor.exe 120 PID 4120 wrote to memory of 2472 4120 omsecor.exe 120 PID 4120 wrote to memory of 2472 4120 omsecor.exe 120 PID 2472 wrote to memory of 512 2472 omsecor.exe 122 PID 2472 wrote to memory of 512 2472 omsecor.exe 122 PID 2472 wrote to memory of 512 2472 omsecor.exe 122 PID 512 wrote to memory of 1276 512 omsecor.exe 124 PID 512 wrote to memory of 1276 512 omsecor.exe 124 PID 512 wrote to memory of 1276 512 omsecor.exe 124 PID 512 wrote to memory of 1276 512 omsecor.exe 124 PID 512 wrote to memory of 1276 512 omsecor.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_300088abd70550ddefce857e37c1ba2e_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 512 -s 2688⤵
- Program crash
PID:4188
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 2926⤵
- Program crash
PID:4304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 2884⤵
- Program crash
PID:2280
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3300 -s 2882⤵
- Program crash
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3300 -ip 33001⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 692 -ip 6921⤵PID:3884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4120 -ip 41201⤵PID:6064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 512 -ip 5121⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5e74cff6c3538b37787dc2ced36e6f553
SHA12c7d80e3118af844c001c37dc79392c5da5be4f3
SHA256355d4cbca5f3cd2f396258f9b004c7e7f10acdbc10e296499f1ab99eda6466be
SHA512fb164545c5f6aec8924f72f25fc1354d08ddc97033139a3184ed7f928c3f4abbf798ef298e200d6d8bb2f9e2899e465885469d9d686a9a424545067caa564ce0
-
Filesize
134KB
MD5f0ecaed6b9def09a0d382a961919cc50
SHA18ac9a5207181bea1609bc2cdb6688de37c921872
SHA256e591d5cde580c732da66d35a6f8c2c8d25330bbf12d13cbfc75de077928fd01c
SHA51264344f81653ebe11c476b9062b1e5c7c64573ecd90b918f73052c69d6b51690462dafacf56d4d9aa17f56f1325ed1d97325c9114a97ef53832ab7a0a828a4cb2
-
Filesize
134KB
MD5ebab0795552ed71b1c6076cdc057036c
SHA1a656e959b4de684b1f24bbf28fd1e9b998efea60
SHA256ae4b97bf851f2b237b6a64db71aa45696db4ad141482d81314f9548d712d241b
SHA512b030e97ce8d0f569a7d3d5e9e67badeb57df12c957f580526e06815ea3c780ecb6b8235570b0c5b202172b952260f32efb8b02c3f07e7614e0d074d323f39f6f