Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 14:32
General
-
Target
2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe
-
Size
581KB
-
MD5
5195e2e8f4b4159935e6e073b5374e73
-
SHA1
2e436531d0c630daf2f78a9956ec349a8349585d
-
SHA256
553463b7f26cbb1dd837663bb1070e3e5855704135df7ce1aa8db1fcd2fee49b
-
SHA512
767afa7de3029a1499bee15ac4fe40d66f94b1e2b5adafdddbb6b250e59e6552d2d60acec91594af9205509692180aa2478f78458aca7cdd04fbd5a693344247
-
SSDEEP
6144:JajY1oC+/U8Vjlx4kk9HKda4L38c8hpdoSQbQFsrF1W/h84IrV7mMpH8zQW4jQwd:fOlx4kk9HKda4YJoSiQi4kVdcQzjk4
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation fexej.exe -
Executes dropped EXE 2 IoCs
pid Process 4976 fexej.exe 2928 jiqoq.exe -
resource yara_rule behavioral1/memory/5384-0-0x0000000000400000-0x00000000004BF26D-memory.dmp upx behavioral1/files/0x000e0000000240fe-6.dat upx behavioral1/memory/5384-13-0x0000000000400000-0x00000000004BF26D-memory.dmp upx behavioral1/memory/4976-16-0x0000000000400000-0x00000000004BF26D-memory.dmp upx behavioral1/memory/4976-25-0x0000000000400000-0x00000000004BF26D-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fexej.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jiqoq.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe 2928 jiqoq.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2928 jiqoq.exe Token: SeIncBasePriorityPrivilege 2928 jiqoq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5384 wrote to memory of 4976 5384 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 92 PID 5384 wrote to memory of 4976 5384 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 92 PID 5384 wrote to memory of 4976 5384 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 92 PID 5384 wrote to memory of 5616 5384 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 93 PID 5384 wrote to memory of 5616 5384 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 93 PID 5384 wrote to memory of 5616 5384 2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe 93 PID 4976 wrote to memory of 2928 4976 fexej.exe 109 PID 4976 wrote to memory of 2928 4976 fexej.exe 109 PID 4976 wrote to memory of 2928 4976 fexej.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-02_5195e2e8f4b4159935e6e073b5374e73_amadey_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5384 -
C:\Users\Admin\AppData\Local\Temp\fexej.exe"C:\Users\Admin\AppData\Local\Temp\fexej.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\jiqoq.exe"C:\Users\Admin\AppData\Local\Temp\jiqoq.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:5616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338B
MD5e81fbcc3bc290aa87edaa1e9aa760a10
SHA10f7fb26af50fccfbcc9a2a7252a5fff8f69a31be
SHA2561009023288a32aa9d4b8c0e197691fee0ad001a98855f906c75d847da4084218
SHA51218522a98ed654de7ac8aa90705bc3cc74ca018ac351664ce79f0b5412ea5046a2d77bc66d6557c4f25005d5830b686e5c9c33902de312ff8cf7fdba2b549032d
-
Filesize
581KB
MD544b8d2b0974063d48e6d8215ce6e117e
SHA15a11962e567d08a2debdaecaa6add1e604f330f7
SHA2561063baade1d2c3f9ba618af972c5f0884b44753ec05c95230cfe732d2b8073ed
SHA51213d5c83b3872eee34661d90db5d57059e380f6e8c5251866dbf8cae47f0e961d04d61f77825e6539d52c9c744f323426aba2d03958abbad5f8aca6632bcf51ac
-
Filesize
512B
MD540b7e4e3d1134a90520440a198a92681
SHA1e0b459cf96cab72042ede36bb72e5ac0d91a49b6
SHA256aa556a626033e166c93ecf99d904304eaadfe4db6e63496ca1c331d04f0ce7b0
SHA512248c8d833cfc72830bb8108834988ede8dfc2cdee2d90b205f32015bbfdde6ac981927668c76cd7ffe25360a6134c2dcccad65dffe053f12dea38312675a66e7
-
Filesize
201KB
MD57354cc9404babf3c678e3116117fa1b4
SHA142255162c651784e51efe8adbfad1287a8f247a0
SHA25606061a179fdbc2df43eaf287149beb27624fff3db12e3ac4ee65032d2ada1777
SHA51264b37c5b2658235e2812d13f5dbf92ab06bd7b45ea726fb4deeef1f30287682f9e53a6301d232d21c2f9455e5a2e851b5c261cc55b834bb067061ebd53e9ad11