Analysis
-
max time kernel
42s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250314-en
General
-
Target
2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe
-
Size
225KB
-
MD5
64867de072235cf392911dd2dd1c6209
-
SHA1
b16a368485816fcf4f17fa2d955bd6c785de4a38
-
SHA256
4ff15734c11b247a4c3fc7871e9a8bfd648d20b7c09438aca1b5f45fc52b0b86
-
SHA512
e9078865d5af71a812169722d8caaffa04efe8f44bbbadf7a5900f8829741fed3e2ac64e7f3f4f29aa034779e7520a49b6cfaad57eb1b2ced88ec9abe2d05a06
-
SSDEEP
6144:BA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:BATuTAnKGwUAW3ycQqgf
Malware Config
Signatures
-
Tinba family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2116 winver.exe 2116 winver.exe 2116 winver.exe 2116 winver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1204 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 winver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2116 2916 2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe 30 PID 2916 wrote to memory of 2116 2916 2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe 30 PID 2916 wrote to memory of 2116 2916 2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe 30 PID 2916 wrote to memory of 2116 2916 2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe 30 PID 2916 wrote to memory of 2116 2916 2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe 30 PID 2116 wrote to memory of 1204 2116 winver.exe 21 PID 2116 wrote to memory of 1104 2116 winver.exe 19 PID 2116 wrote to memory of 1168 2116 winver.exe 20 PID 2116 wrote to memory of 1204 2116 winver.exe 21 PID 2116 wrote to memory of 1628 2116 winver.exe 23 PID 2116 wrote to memory of 2916 2116 winver.exe 29
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-30_64867de072235cf392911dd2dd1c6209_amadey_rhadamanthys_smoke-loader.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\winver.exewinver3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2116
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1628