Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 05:27
General
-
Target
2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe
-
Size
461KB
-
MD5
3444aad7609b0c9c41c39deafa16fab6
-
SHA1
a41ae6e5268dad024d5217ce5cd0e1cbcd3e813e
-
SHA256
eebdf5175db16b6691617037b074bf33ce4df24c009ca44097c0e9c793a72326
-
SHA512
2728149fa608970cde0627ed988d14b3c50c8335dff12852419517ffce179789aeaa432e92cf3d56030699f5c3d24cf3d587b32a1e0c8e681b1eb95a3efea627
-
SSDEEP
6144:LEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpdFRdmH:LMpASIcWYx2U6hAJQnh
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation 2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation juwai.exe Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation wewebi.exe -
Executes dropped EXE 3 IoCs
pid Process 3288 juwai.exe 244 wewebi.exe 5824 toaso.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language juwai.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wewebi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toaso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe 5824 toaso.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4184 wrote to memory of 3288 4184 2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe 87 PID 4184 wrote to memory of 3288 4184 2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe 87 PID 4184 wrote to memory of 3288 4184 2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe 87 PID 4184 wrote to memory of 636 4184 2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe 88 PID 4184 wrote to memory of 636 4184 2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe 88 PID 4184 wrote to memory of 636 4184 2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe 88 PID 3288 wrote to memory of 244 3288 juwai.exe 90 PID 3288 wrote to memory of 244 3288 juwai.exe 90 PID 3288 wrote to memory of 244 3288 juwai.exe 90 PID 244 wrote to memory of 5824 244 wewebi.exe 110 PID 244 wrote to memory of 5824 244 wewebi.exe 110 PID 244 wrote to memory of 5824 244 wewebi.exe 110 PID 244 wrote to memory of 4756 244 wewebi.exe 111 PID 244 wrote to memory of 4756 244 wewebi.exe 111 PID 244 wrote to memory of 4756 244 wewebi.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_3444aad7609b0c9c41c39deafa16fab6_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\juwai.exe"C:\Users\Admin\AppData\Local\Temp\juwai.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\wewebi.exe"C:\Users\Admin\AppData\Local\Temp\wewebi.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\toaso.exe"C:\Users\Admin\AppData\Local\Temp\toaso.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364B
MD5ae42f11fbb5599ed86b921eaaabf2a84
SHA1aff21f1fce51c38f21876a706824271f8e2957ca
SHA256b27c101c221fe83e1df978cd17093c3706b9fdd21daf946012dfb6c84feced65
SHA512e24bc5ca7fbf46204c4556323669aafc67927d70cd7205536495b8370973391a6e0a2b89b06efc13e5b724d07a298fe8f92d914404bf48e31d1d01963818a4e8
-
Filesize
224B
MD5842101476fe21cc82624d5d9ddea4cb4
SHA12e019515b8626d6de9b6af0596462998d908634a
SHA256cfcb01a1dd20fbb7842eea04dc5032b70f0f8a2dc521521b07ef5b04d74c0250
SHA5122afd77c46e575a625e32475ddd25f4e104e1b48cd5677d9e6c01b084253a2bfa926a94788038e6cffd2fc80cac6c51a3082d23419a3c10cb2c1e2f2186a812b7
-
Filesize
512B
MD502c7904fc88b86ffcae123ca3619b810
SHA11d819682451d187ee358570164edfbaf34a18ef0
SHA25691e2bf21d8e7bf16d79a2b4cc3a6a8c97843a1bc37dd5345019576366c29cbed
SHA51250bb8facaaa281097ad4f54e415d964c430ca99843f51d6456e69a63446f0eeef290a7535002c7e2b1bbf1eb2b9fbbd8c384d0a1b4d23aae954efa9ed42dc8d5
-
Filesize
461KB
MD53672439fe85641db4d321ab68d1beea8
SHA1c37b08125741ce36a5ed91bfdb229949971270b9
SHA256a74bef778ce8d8c4da4610e5388c5bf2ff1d2b0006d3af11f25a547669f8d53a
SHA512166111518ef719f362c7e45b53dfc9c7aa5d256f7ffe476eb3589d317890b225423d20d72157393ec2d37971b438dd3f4c786034ba5a2c04c49348b9353f9f2e
-
Filesize
223KB
MD5b30113486308674ce8222bde8e85c763
SHA169dc1a28bf594c1e9fdb462ff04e84c9952601b4
SHA256851b0d44650debf692ebf19df12f84b7044fbe63bff1183da7e904f754ef82f3
SHA512a970ebf2c9524f8f6b5cfed63980edb27ff6bae276486413d200414101060247880606008d86db58253d90c727a1ec5760ab7408f7ac175b4f428267d0bf0c80
-
Filesize
461KB
MD5dcf5d2f5942b4345ee9195497ac05167
SHA1184cb615e26d75c9d83b0c7fd43dda7926b7142e
SHA256f35b51e7c9632d924e46a13696832838f068e6e77319ffb755a0db4ebf45d62e
SHA512a663180a23e48ee4caed6884fcfbdd203129af48e1499456b5a93540a67f46b5afea40e3f281e6c89ef096905a427745793daa4e95bae0a3512dd95f850c2523