Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 05:27

General

  • Target

    2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe

  • Size

    461KB

  • MD5

    3444aad7609b0c9c41c39deafa16fab6

  • SHA1

    a41ae6e5268dad024d5217ce5cd0e1cbcd3e813e

  • SHA256

    eebdf5175db16b6691617037b074bf33ce4df24c009ca44097c0e9c793a72326

  • SHA512

    2728149fa608970cde0627ed988d14b3c50c8335dff12852419517ffce179789aeaa432e92cf3d56030699f5c3d24cf3d587b32a1e0c8e681b1eb95a3efea627

  • SSDEEP

    6144:LEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpdFRdmH:LMpASIcWYx2U6hAJQnh

Score
10/10

Malware Config

Extracted

Family

urelas

C2

218.54.31.165

218.54.31.226

Signatures

  • Urelas

    Urelas is a trojan targeting card games.

  • Urelas family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Users\Admin\AppData\Local\Temp\juwai.exe
      "C:\Users\Admin\AppData\Local\Temp\juwai.exe" hi
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3288
      • C:\Users\Admin\AppData\Local\Temp\wewebi.exe
        "C:\Users\Admin\AppData\Local\Temp\wewebi.exe" OK
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:244
        • C:\Users\Admin\AppData\Local\Temp\toaso.exe
          "C:\Users\Admin\AppData\Local\Temp\toaso.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:5824
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4756
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

    Filesize

    364B

    MD5

    ae42f11fbb5599ed86b921eaaabf2a84

    SHA1

    aff21f1fce51c38f21876a706824271f8e2957ca

    SHA256

    b27c101c221fe83e1df978cd17093c3706b9fdd21daf946012dfb6c84feced65

    SHA512

    e24bc5ca7fbf46204c4556323669aafc67927d70cd7205536495b8370973391a6e0a2b89b06efc13e5b724d07a298fe8f92d914404bf48e31d1d01963818a4e8

  • C:\Users\Admin\AppData\Local\Temp\_vslite.bat

    Filesize

    224B

    MD5

    842101476fe21cc82624d5d9ddea4cb4

    SHA1

    2e019515b8626d6de9b6af0596462998d908634a

    SHA256

    cfcb01a1dd20fbb7842eea04dc5032b70f0f8a2dc521521b07ef5b04d74c0250

    SHA512

    2afd77c46e575a625e32475ddd25f4e104e1b48cd5677d9e6c01b084253a2bfa926a94788038e6cffd2fc80cac6c51a3082d23419a3c10cb2c1e2f2186a812b7

  • C:\Users\Admin\AppData\Local\Temp\golfinfo.ini

    Filesize

    512B

    MD5

    02c7904fc88b86ffcae123ca3619b810

    SHA1

    1d819682451d187ee358570164edfbaf34a18ef0

    SHA256

    91e2bf21d8e7bf16d79a2b4cc3a6a8c97843a1bc37dd5345019576366c29cbed

    SHA512

    50bb8facaaa281097ad4f54e415d964c430ca99843f51d6456e69a63446f0eeef290a7535002c7e2b1bbf1eb2b9fbbd8c384d0a1b4d23aae954efa9ed42dc8d5

  • C:\Users\Admin\AppData\Local\Temp\juwai.exe

    Filesize

    461KB

    MD5

    3672439fe85641db4d321ab68d1beea8

    SHA1

    c37b08125741ce36a5ed91bfdb229949971270b9

    SHA256

    a74bef778ce8d8c4da4610e5388c5bf2ff1d2b0006d3af11f25a547669f8d53a

    SHA512

    166111518ef719f362c7e45b53dfc9c7aa5d256f7ffe476eb3589d317890b225423d20d72157393ec2d37971b438dd3f4c786034ba5a2c04c49348b9353f9f2e

  • C:\Users\Admin\AppData\Local\Temp\toaso.exe

    Filesize

    223KB

    MD5

    b30113486308674ce8222bde8e85c763

    SHA1

    69dc1a28bf594c1e9fdb462ff04e84c9952601b4

    SHA256

    851b0d44650debf692ebf19df12f84b7044fbe63bff1183da7e904f754ef82f3

    SHA512

    a970ebf2c9524f8f6b5cfed63980edb27ff6bae276486413d200414101060247880606008d86db58253d90c727a1ec5760ab7408f7ac175b4f428267d0bf0c80

  • C:\Users\Admin\AppData\Local\Temp\wewebi.exe

    Filesize

    461KB

    MD5

    dcf5d2f5942b4345ee9195497ac05167

    SHA1

    184cb615e26d75c9d83b0c7fd43dda7926b7142e

    SHA256

    f35b51e7c9632d924e46a13696832838f068e6e77319ffb755a0db4ebf45d62e

    SHA512

    a663180a23e48ee4caed6884fcfbdd203129af48e1499456b5a93540a67f46b5afea40e3f281e6c89ef096905a427745793daa4e95bae0a3512dd95f850c2523

  • memory/244-25-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/244-39-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/3288-24-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4184-0-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4184-13-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/5824-36-0x00000000007B0000-0x0000000000850000-memory.dmp

    Filesize

    640KB

  • memory/5824-41-0x00000000007B0000-0x0000000000850000-memory.dmp

    Filesize

    640KB

  • memory/5824-42-0x00000000007B0000-0x0000000000850000-memory.dmp

    Filesize

    640KB

  • memory/5824-43-0x00000000007B0000-0x0000000000850000-memory.dmp

    Filesize

    640KB

  • memory/5824-44-0x00000000007B0000-0x0000000000850000-memory.dmp

    Filesize

    640KB

  • memory/5824-45-0x00000000007B0000-0x0000000000850000-memory.dmp

    Filesize

    640KB