Analysis

  • max time kernel
    132s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 16:10

General

  • Target

    2025-03-30_222f7516c7424f05fd0cbbcbdf25cd0b_amadey_rhadamanthys_smoke-loader.exe

  • Size

    5.5MB

  • MD5

    222f7516c7424f05fd0cbbcbdf25cd0b

  • SHA1

    1c0de6486a859d7fc373e294bc893187bf6226d3

  • SHA256

    42cdd97b333d36f2b18ec2bd5633012aa386dbc6a1d0b1f8b814ad1068e5f55a

  • SHA512

    5934f6552b2dc6b1658e0f46b586e25ec744e0a29d63ad124fe1b558f21821270489d97225ec22a0b21c795f291f870e26da68b792c4eee90076b7f9a34c7143

  • SSDEEP

    98304:IGoqTB3ovZVtMnYhWYJgJheWRsFn0iydrEXvZG:Iqg/MYkYOJhjRsF0i+oxG

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 8 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-30_222f7516c7424f05fd0cbbcbdf25cd0b_amadey_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-30_222f7516c7424f05fd0cbbcbdf25cd0b_amadey_rhadamanthys_smoke-loader.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Users\Admin\AppData\Local\Temp\encdgrpdlp.exe
      "C:\Users\Admin\AppData\Local\Temp\encdgrpdlp.exe" "C:\Users\Admin\AppData\Local\Temp\eunlyyzftq.exe" "C:\Users\Admin\AppData\Local\Temp\2025-03-30_222f7516c7424f05fd0cbbcbdf25cd0b_amadey_rhadamanthys_smoke-loader.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3660
    • C:\Users\Admin\AppData\Local\Temp\jzfbcgxrzi.exe
      C:\Users\Admin\AppData\Local\Temp\jzfbcgxrzi.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5428
      • C:\Windows\System32\cmd.exe
        /c sc config msdtc obj= LocalSystem
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:6020
        • C:\Windows\system32\sc.exe
          sc config msdtc obj= LocalSystem
          4⤵
          • Launches sc.exe
          PID:3612
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\mk02C6re.bat"
        3⤵
          PID:3196
        • C:\Windows\System32\bindsvc.exe
          "C:\Windows\System32\bindsvc.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2612
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2992
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Modifies data under HKEY_USERS
        PID:4524
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 804 808 816 8192 812 784
        2⤵
        • Modifies data under HKEY_USERS
        PID:4600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\encdgrpdlp.exe

      Filesize

      51KB

      MD5

      e48b89715bf5e4c55eb5a1fed67865d9

      SHA1

      89a287da39e14b02cdc284eb287549462346d724

      SHA256

      c25d90168fc2026d8ed2a69c066bd5a7e11004c3899928a7db24cb7636fc4d9e

      SHA512

      4bd77d2fa5da646009ebeeedb5610048c58598ee7e5aeb5660b0c01042f0f34a88f89181e13e86c06cae9984155d0299128a2aee1c2c16f18e284db4745d850c

    • C:\Users\Admin\AppData\Local\Temp\jzfbcgxrzi.exe

      Filesize

      580KB

      MD5

      2c2029588ad8b86759c17b7ae885ee03

      SHA1

      91653b5344d4c210201218e2f215dd5228d76799

      SHA256

      3ab288c47914e33cc61985e46502158400faa9d7187b55c19039b8795504a290

      SHA512

      88531fe6b0f2d66ada368a431f912868f74f9ed8ade9dc88887807b761490fe2cc317e1b6b40e7070411924c80971f237dca68ad2faafa7b4b1ecd2ec90c860f

    • C:\Users\Admin\AppData\Local\Temp\mk02C6re.bat

      Filesize

      196B

      MD5

      b96ab885fc033e97586891a683d56227

      SHA1

      941cbc2c4a7048d0b8c9b6869e38096b856d289a

      SHA256

      db05e0379c9feb53bb0a013b43669dfa6a1eef5374e2e52978971a156ebb02b1

      SHA512

      3cf3eb2b2104c04acf5a804a1caa3336543358bce87967f3c165f544fc0663f8b9bf0e255383b956a27f734adb189834f94ce48eb24b3f4a3e712d480f3d94e9

    • C:\Users\Admin\AppData\Roaming\Microsoft\UserSetting\trnmg.sdb

      Filesize

      1KB

      MD5

      8b0e8b068f8477d7256761ddba7a4dc9

      SHA1

      71df7c5450ae59edcec42f00dc49083f22faf91a

      SHA256

      2c975d1b1dac6381154b02863df61039a44a83a528666cedbc2eccde991cb54a

      SHA512

      453bd9ee84eb36605e5d65bbd32438f8853d0aad304ca86e7cef8f91cabf1478a695f14aa4441760aa6390bcd9c685e2a5724ed8bb4e6aed5505d54ef2bef1f5

    • C:\Windows\SysWOW64\bindsvc.exe

      Filesize

      291KB

      MD5

      7c5b397fb54d5aa06bd2a6fb99c62fee

      SHA1

      a9e0bf7bbabf6ab9e294156985537ae972ebd743

      SHA256

      d032bdc64c9451bbb653b346c5bd6ac9f83a91edeb0155497f098c8d6182ddee

      SHA512

      daa4702eff625b5dd1edca358c653338cff4eeca4e43d12dfd39bbc52acf8dfde3b963d190cf4426e405d9db8bcc9817cd50868055aa0d4a9efe4d1042beaf0c

    • memory/2992-34-0x000002409AF90000-0x000002409AFA0000-memory.dmp

      Filesize

      64KB

    • memory/2992-18-0x000002409AE90000-0x000002409AEA0000-memory.dmp

      Filesize

      64KB

    • memory/2992-50-0x00000240A3480000-0x00000240A3488000-memory.dmp

      Filesize

      32KB

    • memory/2992-54-0x00000240A4690000-0x00000240A4698000-memory.dmp

      Filesize

      32KB

    • memory/4600-69-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-75-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-60-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-61-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-62-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-63-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-66-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-67-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-65-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-70-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-71-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-58-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-68-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-64-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-72-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-73-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-74-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-59-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-76-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-77-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-78-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-79-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-80-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-83-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-82-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-81-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-85-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-84-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-56-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/4600-57-0x0000028521D20000-0x0000028521D30000-memory.dmp

      Filesize

      64KB

    • memory/5428-128-0x0000000000010000-0x000000000018A000-memory.dmp

      Filesize

      1.5MB

    • memory/5428-112-0x0000000000010000-0x000000000018A000-memory.dmp

      Filesize

      1.5MB

    • memory/5428-11-0x0000000000010000-0x000000000018A000-memory.dmp

      Filesize

      1.5MB