Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 14:50
General
-
Target
2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe
-
Size
464KB
-
MD5
3e52f7a6bc53d885725e7874ba2ff949
-
SHA1
7951bbc1fa0cc5247c5d8f3e96dbfa04ad794e62
-
SHA256
bf16b32466789e15f84f2dd7f3a92719cf8e713c34c11989b3cbc3b8b83faab9
-
SHA512
d536eceac0ee5b0a92395b28a03286d45caa99ba136ae55f662eeee49876016537dd41f74d816fce2edf536afe3f78c0507025cff0819ce427b6d01118d05ddd
-
SSDEEP
12288:Y6twjLHj/8/GcHUIdPPzEmvTnabAh0ZnAr1U4:Y6tQCG0UUPzEkTn4AC1+f
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.30.235
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation ipjov.exe -
Executes dropped EXE 2 IoCs
pid Process 4168 ipjov.exe 4152 ziuwh.exe -
resource yara_rule behavioral1/files/0x00160000000227c9-22.dat upx behavioral1/memory/4152-25-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/4152-29-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/4152-30-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/4152-31-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/4152-32-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/4152-33-0x0000000000400000-0x000000000049F000-memory.dmp upx behavioral1/memory/4152-34-0x0000000000400000-0x000000000049F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipjov.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziuwh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe 4152 ziuwh.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2008 wrote to memory of 4168 2008 2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe 90 PID 2008 wrote to memory of 4168 2008 2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe 90 PID 2008 wrote to memory of 4168 2008 2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe 90 PID 2008 wrote to memory of 2632 2008 2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe 91 PID 2008 wrote to memory of 2632 2008 2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe 91 PID 2008 wrote to memory of 2632 2008 2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe 91 PID 4168 wrote to memory of 4152 4168 ipjov.exe 109 PID 4168 wrote to memory of 4152 4168 ipjov.exe 109 PID 4168 wrote to memory of 4152 4168 ipjov.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_3e52f7a6bc53d885725e7874ba2ff949_amadey_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\ipjov.exe"C:\Users\Admin\AppData\Local\Temp\ipjov.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\ziuwh.exe"C:\Users\Admin\AppData\Local\Temp\ziuwh.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_sannuy.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338B
MD5cd80559c0bd1d6d531b276df3d0e86a2
SHA1fde039d08697634ccc2915b65b6a8dab849557fb
SHA25656bbda62f1ffba5051fae84f628dd591d61bf9f14391fb874f9455968e7271dd
SHA5121c8383d69183c7655f05eeb2f5f5a9aa9b037bb6448a5d07c0bc520f068d949e8c735cbf0f97de1f23075fbf0b4d11e4501bbb5165285d144b8000b404d23d8d
-
Filesize
512B
MD52e7749c2b62b8bc996724fbda84d3a40
SHA11de5659e1da197c0ad0dbe8676bc18ca0bc94ae7
SHA2569f633a915e8500cbcfdcd12637890aebb2e481f8cd3c3a8ca80068efcf7882c3
SHA5124b2470ccc2a0041d2efc8e0834e9f754f80e92806f1d1e3c740fb34ecf5cae04d6c0dc7d9d31d15287f2b99925481d3b87c29459d4fb25db8fcb2218af4d78c3
-
Filesize
464KB
MD56302cef755eb62df60d0d9820d59d878
SHA1c0b8ec129e793ac2a480c5906a47ee13ed196f41
SHA2560b010534b696ecd13075412d4b55c0ee213a0860c2bcdcc8451403e048c21836
SHA512d329739d8b84ed35b08f3cce4cd0adb0d9db1c14129a333b6fac9453692f8aa76ee741b992c44ec7561a51e74d6c0e82c1202c5c863da30ba614a8bbca66333d
-
Filesize
198KB
MD50b04548474fb1809bec3f66ee76a633a
SHA1569275a074d9c5c12e4a148df9483c4b3d51b0d5
SHA256170703d896e2e96ba93fd103acbf7f669586ea4949883a356db3b5d5d7c9848d
SHA512cc134da15ec6d5bc9a76a8b2a9671a79441bafdf37dfb23bbcb3a23c945729ed190e4ff0cea0d8a0f2723e05194d6e2be0f0a1249aa72926a9ae3cc296208bb1