Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 15:15
General
-
Target
2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe
-
Size
400KB
-
MD5
6784de327530a5fd162a370a4c500af3
-
SHA1
331b6c1c41e2fcdf3d257af94ea6f71878ee5abd
-
SHA256
70f36ffdb6cd8f8af66288e1cd9a3d097b5bb0db4b8a0a3e4ff7f1b9fcdd1344
-
SHA512
fed12a9ec011964a6df5495e1380f38ee547e3da8eb22da18a996a4e7a95d4d51bd4c2c29410d79be87d930f92ec148826f67b1c8660808c9ad20d33d7fbc05f
-
SSDEEP
6144:85SXvBoDWoyLYyzbkPC4DYM6SB6v+qLnAzYmhwrxcvkzmSBrohh:8IfBoDWoyFblU6hAJQnOr
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation pykiz.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation fugisy.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation 2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe -
Executes dropped EXE 3 IoCs
pid Process 5872 pykiz.exe 1252 fugisy.exe 5996 tyeqf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pykiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fugisy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyeqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe 5996 tyeqf.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5756 wrote to memory of 5872 5756 2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe 85 PID 5756 wrote to memory of 5872 5756 2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe 85 PID 5756 wrote to memory of 5872 5756 2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe 85 PID 5756 wrote to memory of 2964 5756 2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe 86 PID 5756 wrote to memory of 2964 5756 2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe 86 PID 5756 wrote to memory of 2964 5756 2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe 86 PID 5872 wrote to memory of 1252 5872 pykiz.exe 88 PID 5872 wrote to memory of 1252 5872 pykiz.exe 88 PID 5872 wrote to memory of 1252 5872 pykiz.exe 88 PID 1252 wrote to memory of 5996 1252 fugisy.exe 109 PID 1252 wrote to memory of 5996 1252 fugisy.exe 109 PID 1252 wrote to memory of 5996 1252 fugisy.exe 109 PID 1252 wrote to memory of 4272 1252 fugisy.exe 110 PID 1252 wrote to memory of 4272 1252 fugisy.exe 110 PID 1252 wrote to memory of 4272 1252 fugisy.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-02_6784de327530a5fd162a370a4c500af3_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5756 -
C:\Users\Admin\AppData\Local\Temp\pykiz.exe"C:\Users\Admin\AppData\Local\Temp\pykiz.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5872 -
C:\Users\Admin\AppData\Local\Temp\fugisy.exe"C:\Users\Admin\AppData\Local\Temp\fugisy.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\tyeqf.exe"C:\Users\Admin\AppData\Local\Temp\tyeqf.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364B
MD5f60ebff18364d32487711503e377633c
SHA10fef1454d728754fee1d2023adb94050d30434be
SHA256e07ac9c9eaf1087884b7d144996df399e2e19c59b711bcbe614bddcc543f76cf
SHA512fc8460fd4cc721516437966ed4b4a3b2702970680994257aa778f12239acfd597250c1b45c1c5a302fb601420079a9e007f445cc95307681eac5b5d30e26fdb9
-
Filesize
224B
MD5a30120dd39d24ebefd4deb507bd26f93
SHA138afcd06c9530f9efec5b05b39e60d2995fc63b5
SHA256623408f287641cb7bc51ad82671d2121a61b39067103588199a41ff5b0f55d97
SHA512a6b03c86818d73a4242ebb0c76561b29d4e6348ac890732c40a1c33c954aef41e93340bddda3c6680e667aa2c039ecaa2065ce1b2a65340d66c5c3f5f06d2070
-
Filesize
400KB
MD5859c5abebc7ecd1f591a1961b264d81a
SHA1e0be7c53e024a2185573976754a219de3cdf5a05
SHA256679c777640781b13d0bd49de0f7c8e48ce215ef0961e4254b684bd5147f44aac
SHA51293c06906c80d8703f79828f6cc8bc2718d2c72b91bb18966482bae41ddb6e844e3b7d852f4a83311f7f749f0a9d928171ade93e75b24decc91eb7f5d9b567445
-
Filesize
512B
MD573a693aa57f4e0bf5d87c658efee43b6
SHA1f7b30929308852a5cc47189641e8e35535eb1d82
SHA256613837fcd2bb377ab6e240eaba6f5bce8c87607fe0011e1720ac3021f48eb57d
SHA512eb6b070bcb56d25ef40ac123de995040f76e581cc748e8597aeb28a4e8dafd92cac3d8698df68eac1baf6119dbb89a58339ea4d0a59d3ab7a467650a5264b0b0
-
Filesize
400KB
MD542d24c006acb1f524fd2b441b199d60b
SHA11c372b1074c0754b597be4aa2f08a573b44151c7
SHA256e26dd3810a4637eaded3863c9f37a021da357677e7cffc530ef8531363cba387
SHA512d0cfe54682cb7cf09969a9f4f4bc7343f8902ea7cd7024d47403d84db6ab71d5b1009e5f7bb88d5ba11d36a90f897abefbd71cdae10e969accbb99dc6b1388aa
-
Filesize
223KB
MD549001570a2d1d968f1d6fa7c65c046d2
SHA1cee49d79057d4f0f32055ed3bbb9bc75b4f4f902
SHA2566dfcefa6ddbefad7ae49937d5cbb60a62b61ab11f48eb035e4601019453cf789
SHA512dac11ab9002313d26bca4a88a12cc2d35496331da3969d815dc5c122cbc5c59363c1710b57d0650882050a04f0758b9cf82fedad913b001b3a178ec9bf4a0810