Analysis
-
max time kernel
43s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe
-
Size
225KB
-
MD5
278c0ec8a3d550c377f588316b2daa9a
-
SHA1
7f0f151ba3ed6b96b91e046ba6ecbe90cd5e9425
-
SHA256
2c66741a7454ed6f9bfb29a7ac2784b0ff745a9e98a81902d54ac958482933b8
-
SHA512
37949609cb666ad9aba3c58d9873a448806704ff35c42799a034ed33d40efaa742f9a94a9baf633d27133638b46068a18ab9ac80860e4fd226eb3029687f9efc
-
SSDEEP
6144:+A2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:+ATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Tinba family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2992 winver.exe 2992 winver.exe 2992 winver.exe 2992 winver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1264 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2992 2340 2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe 29 PID 2340 wrote to memory of 2992 2340 2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe 29 PID 2340 wrote to memory of 2992 2340 2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe 29 PID 2340 wrote to memory of 2992 2340 2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe 29 PID 2340 wrote to memory of 2992 2340 2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe 29 PID 2992 wrote to memory of 1264 2992 winver.exe 20 PID 2992 wrote to memory of 1124 2992 winver.exe 18 PID 2992 wrote to memory of 1212 2992 winver.exe 19 PID 2992 wrote to memory of 1264 2992 winver.exe 20 PID 2992 wrote to memory of 1552 2992 winver.exe 24 PID 2992 wrote to memory of 2340 2992 winver.exe 28
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1212
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_278c0ec8a3d550c377f588316b2daa9a_amadey_rhadamanthys_smoke-loader.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2992
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1552