Analysis Overview
SHA256
8c38c395be0daf5c90ffd44263af56a2d5fa0d109dd03fbca087ad6f976c1f3f
Threat Level: Known bad
The file 2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop was found to be: Known bad.
Malicious Activity Summary
Neconyd family
Neconyd
Executes dropped EXE
Drops file in System32 directory
Suspicious use of SetThreadContext
Program crash
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V16
Analysis: static1
Detonation Overview
Reported
2025-07-02 18:52
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2025-07-02 18:52
Reported
2025-07-02 18:55
Platform
win10v2004-20250619-en
Max time kernel
146s
Max time network
145s
Command Line
Signatures
Neconyd
Neconyd family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 692 set thread context of 5432 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe | C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe |
| PID 2632 set thread context of 2020 | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe |
| PID 2320 set thread context of 3340 | N/A | C:\Windows\SysWOW64\omsecor.exe | C:\Windows\SysWOW64\omsecor.exe |
| PID 5472 set thread context of 4508 | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe |
Program crash
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
"C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe"
C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 692 -ip 692
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2632 -ip 2632
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 288
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 296
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2320 -ip 2320
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 300
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5472 -ip 5472
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5472 -s 260
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| GB | 142.250.179.227:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 52.27.79.221:80 | ow5dirasuek.com | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
Files
memory/692-0-0x0000000000400000-0x0000000000424000-memory.dmp
memory/5432-1-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5432-2-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5432-3-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5432-5-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2632-9-0x0000000000400000-0x0000000000424000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 594332f25218c9cb36a5186a39612da5 |
| SHA1 | a80a3fc1f2fe0750d43697a061a4eacc626e01eb |
| SHA256 | 524dbafcdccf5c36ae9efff0c4714309875c372bf590466e6dffdd3379b46020 |
| SHA512 | e1c809c1fc4c70e6d4dab831162e840293e1618f8bcb35e1d3695b53dec35fb7191c54e1cd2186302121009cfe38b40092472c7e32c0432d60b47173e42b9e85 |
memory/2020-14-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2020-15-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2632-17-0x0000000000400000-0x0000000000424000-memory.dmp
memory/692-16-0x0000000000400000-0x0000000000424000-memory.dmp
memory/2020-18-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2020-21-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2020-24-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2020-25-0x0000000000400000-0x0000000000429000-memory.dmp
C:\Windows\SysWOW64\omsecor.exe
| MD5 | 3e38ddac45ebfa9faa6c069ca99170b6 |
| SHA1 | 36093179f7a490e0300d5f36ed3541cf905b3eda |
| SHA256 | fe80f07891d5ad1229ea7cb1e873529c9c97bfe733809aeaecbc67987fbc396f |
| SHA512 | 14d120211e99b2d71dcf7f8279593fc81c90816b5124779c13f0f6ab1660f362131e4cc6c58762ce577d7b83e88e6820dc62891fcf586ef4c340bd882232e67f |
memory/2320-32-0x0000000000400000-0x0000000000424000-memory.dmp
memory/2020-31-0x0000000000400000-0x0000000000429000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 93f948448d75fe7a4a4a4e883e937be6 |
| SHA1 | b8fa1a12459296bf611d5039b1b369f1b87d4713 |
| SHA256 | 145c6d0b7a309f13ed2073c00570f9234da70fc09cbd5037f8b4db193c75ff99 |
| SHA512 | b5556b5661fc2574a33e71b9d163bdf774a281512316e437ecd1cfae0ab421fbcf32847bdd74b80c7806db96701681f0addc3ea7596c8b21b0b5c6bbe34423b9 |
memory/3340-40-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5472-45-0x0000000000400000-0x0000000000424000-memory.dmp
memory/3340-38-0x0000000000400000-0x0000000000429000-memory.dmp
memory/3340-37-0x0000000000400000-0x0000000000429000-memory.dmp
memory/4508-50-0x0000000000400000-0x0000000000429000-memory.dmp
memory/4508-49-0x0000000000400000-0x0000000000429000-memory.dmp
memory/2320-51-0x0000000000400000-0x0000000000424000-memory.dmp
memory/4508-52-0x0000000000400000-0x0000000000429000-memory.dmp
memory/4508-55-0x0000000000400000-0x0000000000429000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2025-07-02 18:52
Reported
2025-07-02 18:55
Platform
win11-20250610-en
Max time kernel
144s
Max time network
144s
Command Line
Signatures
Neconyd
Neconyd family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 1776 set thread context of 5700 | N/A | C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe | C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe |
| PID 4144 set thread context of 3452 | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe |
| PID 4924 set thread context of 4984 | N/A | C:\Windows\SysWOW64\omsecor.exe | C:\Windows\SysWOW64\omsecor.exe |
| PID 5040 set thread context of 5780 | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe |
Program crash
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
"C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe"
C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
C:\Users\Admin\AppData\Local\Temp\2025-07-02_b605fbc7a11d3e1b799e6980118313ed_amadey_elex_rhadamanthys_smoke-loader_stop.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1776 -ip 1776
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 300
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4144 -ip 4144
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 312
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4924 -ip 4924
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 304
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5040 -ip 5040
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 268
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 52.27.79.221:80 | ow5dirasuek.com | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
Files
memory/1776-0-0x0000000000400000-0x0000000000424000-memory.dmp
memory/5700-1-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5700-2-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5700-3-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5700-5-0x0000000000400000-0x0000000000429000-memory.dmp
memory/4144-8-0x0000000000400000-0x0000000000424000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 594332f25218c9cb36a5186a39612da5 |
| SHA1 | a80a3fc1f2fe0750d43697a061a4eacc626e01eb |
| SHA256 | 524dbafcdccf5c36ae9efff0c4714309875c372bf590466e6dffdd3379b46020 |
| SHA512 | e1c809c1fc4c70e6d4dab831162e840293e1618f8bcb35e1d3695b53dec35fb7191c54e1cd2186302121009cfe38b40092472c7e32c0432d60b47173e42b9e85 |
memory/3452-14-0x0000000000400000-0x0000000000429000-memory.dmp
memory/3452-15-0x0000000000400000-0x0000000000429000-memory.dmp
memory/4144-16-0x0000000000400000-0x0000000000424000-memory.dmp
memory/1776-17-0x0000000000400000-0x0000000000424000-memory.dmp
memory/3452-18-0x0000000000400000-0x0000000000429000-memory.dmp
memory/3452-21-0x0000000000400000-0x0000000000429000-memory.dmp
memory/3452-24-0x0000000000400000-0x0000000000429000-memory.dmp
memory/3452-25-0x0000000000400000-0x0000000000429000-memory.dmp
memory/3452-33-0x0000000000400000-0x0000000000429000-memory.dmp
C:\Windows\SysWOW64\omsecor.exe
| MD5 | b898f671200923edec86c5e9f6c21b60 |
| SHA1 | 1160b70a770a251861c76736ff2700a98765ae90 |
| SHA256 | 0f265bb4acaf8b8b2d104e0413281da9e9cb451536e0489eb0bd391f99153f5c |
| SHA512 | 3ecf29d186426478e040f3e8df8936820ac513bed37d6f6388124e13fc3ae13fe356a13d08d7fe3c3aa7ea2f2d5abfd45edd2da7f599fdae3b44d6ff8ef8aeac |
memory/4924-35-0x0000000000400000-0x0000000000424000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | bc70b2c2d130a9d979c297e9c1e87980 |
| SHA1 | d924ec21cdbb6d9b48d79fa373689a674e59f59a |
| SHA256 | 4507c07a5a14dbbdbbd9a91b48f3889a53f1ebfab59d967bf04671b3eb54ee28 |
| SHA512 | e61d03f2206365eb13597ddf1c26ed602ab4ec7258c48fa6da92d7713cdb324ba2448f39a4a501b50c0a10208b210597928db743bb448d26be8a4df6274d6841 |
memory/4984-43-0x0000000000400000-0x0000000000429000-memory.dmp
memory/4984-38-0x0000000000400000-0x0000000000429000-memory.dmp
memory/4984-39-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5040-46-0x0000000000400000-0x0000000000424000-memory.dmp
memory/5780-50-0x0000000000400000-0x0000000000429000-memory.dmp
memory/4924-51-0x0000000000400000-0x0000000000424000-memory.dmp
memory/5780-52-0x0000000000400000-0x0000000000429000-memory.dmp
memory/5780-55-0x0000000000400000-0x0000000000429000-memory.dmp