Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 20:56
Static task
static1
General
-
Target
2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe
-
Size
134KB
-
MD5
28b4fdfa3417604c4d9c32ecf4f7d464
-
SHA1
fb13169b499148e76d6a6e9e3caa98bab573f5cb
-
SHA256
0cabd97389287b1c6b04ad471fd5c256a53650ca7a4fe4e6c4a8cb1b81c4a2b9
-
SHA512
b0c758c17ae83a070bde67fa086fbb7b1ff823c989a7717bc9ed492ac6ae1c373ec0ad1992cff56d1cf93f2652ab24302c0b9edc2a3058e4d8ecb2e209b4d4bb
-
SSDEEP
1536:CDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiP:0iRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 4156 omsecor.exe 4024 omsecor.exe 448 omsecor.exe 2872 omsecor.exe 3428 omsecor.exe 4148 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5864 set thread context of 2664 5864 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 87 PID 4156 set thread context of 4024 4156 omsecor.exe 92 PID 448 set thread context of 2872 448 omsecor.exe 116 PID 3428 set thread context of 4148 3428 omsecor.exe 120 -
Program crash 4 IoCs
pid pid_target Process procid_target 5376 5864 WerFault.exe 86 3792 4156 WerFault.exe 90 3624 448 WerFault.exe 115 2300 3428 WerFault.exe 118 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 5864 wrote to memory of 2664 5864 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 87 PID 5864 wrote to memory of 2664 5864 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 87 PID 5864 wrote to memory of 2664 5864 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 87 PID 5864 wrote to memory of 2664 5864 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 87 PID 5864 wrote to memory of 2664 5864 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 87 PID 2664 wrote to memory of 4156 2664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 90 PID 2664 wrote to memory of 4156 2664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 90 PID 2664 wrote to memory of 4156 2664 2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe 90 PID 4156 wrote to memory of 4024 4156 omsecor.exe 92 PID 4156 wrote to memory of 4024 4156 omsecor.exe 92 PID 4156 wrote to memory of 4024 4156 omsecor.exe 92 PID 4156 wrote to memory of 4024 4156 omsecor.exe 92 PID 4156 wrote to memory of 4024 4156 omsecor.exe 92 PID 4024 wrote to memory of 448 4024 omsecor.exe 115 PID 4024 wrote to memory of 448 4024 omsecor.exe 115 PID 4024 wrote to memory of 448 4024 omsecor.exe 115 PID 448 wrote to memory of 2872 448 omsecor.exe 116 PID 448 wrote to memory of 2872 448 omsecor.exe 116 PID 448 wrote to memory of 2872 448 omsecor.exe 116 PID 448 wrote to memory of 2872 448 omsecor.exe 116 PID 448 wrote to memory of 2872 448 omsecor.exe 116 PID 2872 wrote to memory of 3428 2872 omsecor.exe 118 PID 2872 wrote to memory of 3428 2872 omsecor.exe 118 PID 2872 wrote to memory of 3428 2872 omsecor.exe 118 PID 3428 wrote to memory of 4148 3428 omsecor.exe 120 PID 3428 wrote to memory of 4148 3428 omsecor.exe 120 PID 3428 wrote to memory of 4148 3428 omsecor.exe 120 PID 3428 wrote to memory of 4148 3428 omsecor.exe 120 PID 3428 wrote to memory of 4148 3428 omsecor.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5864 -
C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exeC:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 2408⤵
- Program crash
PID:2300
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 2926⤵
- Program crash
PID:3624
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 2884⤵
- Program crash
PID:3792
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5864 -s 2882⤵
- Program crash
PID:5376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5864 -ip 58641⤵PID:4012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4156 -ip 41561⤵PID:5628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 448 -ip 4481⤵PID:5784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3428 -ip 34281⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5ef12a0eee4e506479e9ec972758cc0a3
SHA151a33b588a36e94cca5756eaca4177f3fc791368
SHA25677d99691d61ab441bd9d8c1e0612a21dbca325532d16ee9a32e0678012f926a2
SHA5123568caaaf28559546c5a7837d236657d0ac6eced7c7a278124a71713075d259f2979e738dda1bd1705db463debe523359b01d78bd0c5d1ba890e528a68dde085
-
Filesize
134KB
MD5fbca5b2d403263c8584dd0c39c1a0181
SHA12f210443d2c3adebce076e8bb24c73f148b916fa
SHA256222a222a3447913526eef4f8ff28d1b855201df3b8209d18507d70c8a6f86df0
SHA512bc4ed3c02d62c62c3ae2346829500a3efb632490ae012e7b123cadb47acbdc467b5a22454fbbe689ebb948a2bd25f86a39a4fe10cdfa1206361e1ad152893939
-
Filesize
134KB
MD5a602009db2f42405b87418c39e9a73e3
SHA159a8f9d967a909904a917e3428f0ae4ca2878ceb
SHA256d2a03b005598e415351317bf7bed0d762b35c40c19b1b47b85ad0877f9b13cf7
SHA512e680b33115d6e0130f7a482b505273755615f1b9ac8804c786a5221483d3d8330e4580d2802760fe8d8d66b9b09d7000cf25ab1538b61939379341f828c32d97