Analysis

  • max time kernel
    145s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2025, 20:56

General

  • Target

    2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe

  • Size

    134KB

  • MD5

    28b4fdfa3417604c4d9c32ecf4f7d464

  • SHA1

    fb13169b499148e76d6a6e9e3caa98bab573f5cb

  • SHA256

    0cabd97389287b1c6b04ad471fd5c256a53650ca7a4fe4e6c4a8cb1b81c4a2b9

  • SHA512

    b0c758c17ae83a070bde67fa086fbb7b1ff823c989a7717bc9ed492ac6ae1c373ec0ad1992cff56d1cf93f2652ab24302c0b9edc2a3058e4d8ecb2e209b4d4bb

  • SSDEEP

    1536:CDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiP:0iRTeH0iqAW6J6f1tqF6dngNmaZCiaI

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Neconyd family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5864
    • C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe
      C:\Users\Admin\AppData\Local\Temp\2025-04-06_28b4fdfa3417604c4d9c32ecf4f7d464_amadey_rhadamanthys_smoke-loader.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Users\Admin\AppData\Roaming\omsecor.exe
        C:\Users\Admin\AppData\Roaming\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4156
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4024
          • C:\Windows\SysWOW64\omsecor.exe
            C:\Windows\System32\omsecor.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:448
            • C:\Windows\SysWOW64\omsecor.exe
              C:\Windows\SysWOW64\omsecor.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2872
              • C:\Users\Admin\AppData\Roaming\omsecor.exe
                C:\Users\Admin\AppData\Roaming\omsecor.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3428
                • C:\Users\Admin\AppData\Roaming\omsecor.exe
                  C:\Users\Admin\AppData\Roaming\omsecor.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4148
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 240
                  8⤵
                  • Program crash
                  PID:2300
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 292
              6⤵
              • Program crash
              PID:3624
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 288
          4⤵
          • Program crash
          PID:3792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5864 -s 288
      2⤵
      • Program crash
      PID:5376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5864 -ip 5864
    1⤵
      PID:4012
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4156 -ip 4156
      1⤵
        PID:5628
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 448 -ip 448
        1⤵
          PID:5784
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3428 -ip 3428
          1⤵
            PID:4372

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            134KB

            MD5

            ef12a0eee4e506479e9ec972758cc0a3

            SHA1

            51a33b588a36e94cca5756eaca4177f3fc791368

            SHA256

            77d99691d61ab441bd9d8c1e0612a21dbca325532d16ee9a32e0678012f926a2

            SHA512

            3568caaaf28559546c5a7837d236657d0ac6eced7c7a278124a71713075d259f2979e738dda1bd1705db463debe523359b01d78bd0c5d1ba890e528a68dde085

          • C:\Users\Admin\AppData\Roaming\omsecor.exe

            Filesize

            134KB

            MD5

            fbca5b2d403263c8584dd0c39c1a0181

            SHA1

            2f210443d2c3adebce076e8bb24c73f148b916fa

            SHA256

            222a222a3447913526eef4f8ff28d1b855201df3b8209d18507d70c8a6f86df0

            SHA512

            bc4ed3c02d62c62c3ae2346829500a3efb632490ae012e7b123cadb47acbdc467b5a22454fbbe689ebb948a2bd25f86a39a4fe10cdfa1206361e1ad152893939

          • C:\Windows\SysWOW64\omsecor.exe

            Filesize

            134KB

            MD5

            a602009db2f42405b87418c39e9a73e3

            SHA1

            59a8f9d967a909904a917e3428f0ae4ca2878ceb

            SHA256

            d2a03b005598e415351317bf7bed0d762b35c40c19b1b47b85ad0877f9b13cf7

            SHA512

            e680b33115d6e0130f7a482b505273755615f1b9ac8804c786a5221483d3d8330e4580d2802760fe8d8d66b9b09d7000cf25ab1538b61939379341f828c32d97

          • memory/448-33-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/448-51-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/2664-3-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2664-5-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2664-2-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2664-1-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2872-37-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2872-38-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/2872-40-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/3428-45-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4024-14-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4024-15-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4024-31-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4024-25-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4024-22-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4024-19-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4024-26-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4148-49-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4148-50-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4148-52-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4148-55-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4156-16-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/4156-8-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/5864-0-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB

          • memory/5864-17-0x0000000000400000-0x0000000000424000-memory.dmp

            Filesize

            144KB