Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe
-
Size
12.3MB
-
MD5
17fe13437716d7ce13eab20072a470a2
-
SHA1
6e07b55596f7e4b516f3e313a0aa534b178069bd
-
SHA256
23994d6b107a601793968043b2300a102c53d14278b3fd335ce69f7566cda3d4
-
SHA512
3761ff74da517c702a0237ed6a2b7065dd0a6d4a7d00fc139a0d19da2fd15ec66e59f4764d797f0593490957d6a811887a26cf6a046ee546a4c85faed703e870
-
SSDEEP
6144:9AvhPJRn+Uy8dLqZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZE:9UhpLd/
Malware Config
Extracted
tofsee
43.231.4.7
lazystax.ru
Signatures
-
Tofsee family
-
Creates new service(s) 2 TTPs
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3260 netsh.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\gfzljjkb\ImagePath = "C:\\Windows\\SysWOW64\\gfzljjkb\\hjcnucqg.exe" svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe -
Deletes itself 1 IoCs
pid Process 1580 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 5256 hjcnucqg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5256 set thread context of 1580 5256 hjcnucqg.exe 126 -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5992 sc.exe 6036 sc.exe 5480 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hjcnucqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2612 wrote to memory of 4328 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 100 PID 2612 wrote to memory of 4328 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 100 PID 2612 wrote to memory of 4328 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 100 PID 2612 wrote to memory of 5444 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 102 PID 2612 wrote to memory of 5444 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 102 PID 2612 wrote to memory of 5444 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 102 PID 2612 wrote to memory of 5992 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 104 PID 2612 wrote to memory of 5992 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 104 PID 2612 wrote to memory of 5992 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 104 PID 2612 wrote to memory of 6036 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 106 PID 2612 wrote to memory of 6036 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 106 PID 2612 wrote to memory of 6036 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 106 PID 2612 wrote to memory of 5480 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 108 PID 2612 wrote to memory of 5480 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 108 PID 2612 wrote to memory of 5480 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 108 PID 2612 wrote to memory of 3260 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 111 PID 2612 wrote to memory of 3260 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 111 PID 2612 wrote to memory of 3260 2612 2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe 111 PID 5256 wrote to memory of 1580 5256 hjcnucqg.exe 126 PID 5256 wrote to memory of 1580 5256 hjcnucqg.exe 126 PID 5256 wrote to memory of 1580 5256 hjcnucqg.exe 126 PID 5256 wrote to memory of 1580 5256 hjcnucqg.exe 126 PID 5256 wrote to memory of 1580 5256 hjcnucqg.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gfzljjkb\2⤵
- System Location Discovery: System Language Discovery
PID:4328
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hjcnucqg.exe" C:\Windows\SysWOW64\gfzljjkb\2⤵
- System Location Discovery: System Language Discovery
PID:5444
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gfzljjkb binPath= "C:\Windows\SysWOW64\gfzljjkb\hjcnucqg.exe /d\"C:\Users\Admin\AppData\Local\Temp\2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5992
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gfzljjkb "wifi internet conection"2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6036
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gfzljjkb2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5480
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Windows\SysWOW64\gfzljjkb\hjcnucqg.exeC:\Windows\SysWOW64\gfzljjkb\hjcnucqg.exe /d"C:\Users\Admin\AppData\Local\Temp\2025-03-30_17fe13437716d7ce13eab20072a470a2_rhadamanthys_smoke-loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5256 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Sets service image path in registry
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1580
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.2MB
MD50909aad769e419d7e1211b8752de0326
SHA12578411b7fdd37ce28741d8bd85406b5c4ff7eeb
SHA2566e6f879c033c7ae0fe4a99c6eca3eba4126d3e74096777977a424910274bfa85
SHA5125bfd1ff51e47fdcdda57dbb48cb4cfff1b11e99633874b4547a4f2183fe1d54df868faca80121222be726e5f09c06c950fa26f3a8ba1a773e8eb7b69417b5cff