Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 05:26
General
-
Target
2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe
-
Size
440KB
-
MD5
1c8db64c5096333fd8611b61772af10b
-
SHA1
3626d7e04e9a22eb2f6777c6dde26e87bb1e694d
-
SHA256
def73dae6c799c93024d3379b1c3e13c9dae016c11727b7b5429db8835a2f2d6
-
SHA512
2a5c9b840a04ba440d62376b5f83a3a829780013a3e05fd18b561782b975cee81ace9cdbd98bc51a44f7be2910602dbbd754fb53e4f3e6b36d69a8c04971e344
-
SSDEEP
6144:oEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpjk:oMpASIcWYx2U6hAJQnP
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation nopuo.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation ogtoad.exe -
Executes dropped EXE 3 IoCs
pid Process 3660 nopuo.exe 3308 ogtoad.exe 5428 ubyxf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nopuo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogtoad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ubyxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe 5428 ubyxf.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2648 wrote to memory of 3660 2648 2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe 86 PID 2648 wrote to memory of 3660 2648 2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe 86 PID 2648 wrote to memory of 3660 2648 2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe 86 PID 2648 wrote to memory of 4356 2648 2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe 87 PID 2648 wrote to memory of 4356 2648 2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe 87 PID 2648 wrote to memory of 4356 2648 2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe 87 PID 3660 wrote to memory of 3308 3660 nopuo.exe 90 PID 3660 wrote to memory of 3308 3660 nopuo.exe 90 PID 3660 wrote to memory of 3308 3660 nopuo.exe 90 PID 3308 wrote to memory of 5428 3308 ogtoad.exe 110 PID 3308 wrote to memory of 5428 3308 ogtoad.exe 110 PID 3308 wrote to memory of 5428 3308 ogtoad.exe 110 PID 3308 wrote to memory of 3240 3308 ogtoad.exe 111 PID 3308 wrote to memory of 3240 3308 ogtoad.exe 111 PID 3308 wrote to memory of 3240 3308 ogtoad.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_1c8db64c5096333fd8611b61772af10b_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\nopuo.exe"C:\Users\Admin\AppData\Local\Temp\nopuo.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\ogtoad.exe"C:\Users\Admin\AppData\Local\Temp\ogtoad.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\ubyxf.exe"C:\Users\Admin\AppData\Local\Temp\ubyxf.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364B
MD523a456b1c04014150056af02ecf3f27e
SHA17f5fc32628fb217df7a68841778f9f0ff78cf2d6
SHA25688a0874ba9e63849c036209e734f47a445b6f93cadd68891bcf9578416164e44
SHA51224ebc897fce5d51ded80e7ac0decb484bdc26127f2309c6bfa59d4ecd11a201228796de85b1d20f03ff40b6179f71ee3db0be6a8c146b8a08132d4346e720f5e
-
Filesize
224B
MD5f77fbacb034d93b4a66410bc285030d7
SHA131d16478d19382d0cefe0eb33ac17ae4361ac8fe
SHA25695a4090bc7f9d14c507dfb6f5532750709c86ce441bdafa28f66f663d1dc0e9e
SHA5120695889683229ef4478964b7b201a76e3939c4b78778021c6baff200ca211fa045e3f58d5487a2e0f23db958f31498ae27bdb72896f57299e69eef9aa893e814
-
Filesize
512B
MD5378f5a1b2bce843d9da03feac75548ba
SHA1c68a4a45302a4fe5194503fdebfda62eead6e7a6
SHA256e0f531aa89791bfeedd8472b81ee4d5f90eddefbe41b472e280c52fef932728d
SHA5120cadbeba471d1d97ab9694391082cc52200036940cd070638d3605e640e351af7b8708fcf78db603923d084bb19e358fa9262752e7873e57ba583d5496cf0531
-
Filesize
441KB
MD537cbab08abd6c230b8b13943c1c277d7
SHA1b7be0b44fb64549acf06ef0a9e0334d1f4957381
SHA256c8172ccbba49e8d60ade217850f2ee9d7af6e2a0f42856d508fa4134a4816ae9
SHA512597abb356ebaff3a88fdd26da4a4734f2f4a598c8f5acd47f700de8d41eb9486eb5720d36ed52fbf357825546b6c3aba1901a8809fef5b019bba4e4ab4b11169
-
Filesize
441KB
MD593867f3a5d9d996c009f3f6bf9c2643f
SHA1462e3d9401b079bc693d707c1b210d23df2bbfa2
SHA256dc49bc94cd8c4295456f1395ebfd79c5f774e2f781ef8343bc98e3124aa9676b
SHA512b7c98ae66bc86d959384c325935bef5a59abf8caa6ca0e5f43a7d098808d97be50dc46532119c5a2b346aee25bb495fd81cb32eca5674bf239e7200cc0627fb1
-
Filesize
223KB
MD50e9f07fc4c1d2c2be8e95ebb0c2e972e
SHA1a0380e5170a8eedb1b2be04af20709f4615c27e0
SHA256cff2fdbfcbbd2144e50d201892bc027d25c8af8de4daa9d99e72f686207550d2
SHA512b5c524f31cff5cfb7cac615ca958f2b300e040dd652ec4e994d21d350db92079524d62b33b3a4b73c8b246eee3fe925dca1e519dc71b0d182aa346db84b1ba5d