Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 05:34
General
-
Target
2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe
-
Size
461KB
-
MD5
1f01035c9416593a37ef082c83ee4bbc
-
SHA1
4066b194b99c52dad1a54367a1b2c7d761e467f3
-
SHA256
b60e72880976381a40581a44490c9f907fb4ef75bc8527a36697f20b6d719164
-
SHA512
f48e6c1f50c8118e0c9a5ced92ebcac54baf191554fe325a4bb84b0d898ee478c09c147e1b4fa63831a1608bbcf0acfdffe3a4c09ed2001c139852a4d9668384
-
SSDEEP
6144:LEK25f5ySIcWLsxIIW4DYM6SB6v+qLnAzYmhwrxcvkzmSOpdFRdm7:LMpASIcWYx2U6hAJQnV
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation 2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation dufor.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation cynyju.exe -
Executes dropped EXE 3 IoCs
pid Process 224 dufor.exe 4348 cynyju.exe 3436 xomek.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dufor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cynyju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xomek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe 3436 xomek.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2908 wrote to memory of 224 2908 2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe 86 PID 2908 wrote to memory of 224 2908 2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe 86 PID 2908 wrote to memory of 224 2908 2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe 86 PID 2908 wrote to memory of 2328 2908 2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe 87 PID 2908 wrote to memory of 2328 2908 2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe 87 PID 2908 wrote to memory of 2328 2908 2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe 87 PID 224 wrote to memory of 4348 224 dufor.exe 90 PID 224 wrote to memory of 4348 224 dufor.exe 90 PID 224 wrote to memory of 4348 224 dufor.exe 90 PID 4348 wrote to memory of 3436 4348 cynyju.exe 110 PID 4348 wrote to memory of 3436 4348 cynyju.exe 110 PID 4348 wrote to memory of 3436 4348 cynyju.exe 110 PID 4348 wrote to memory of 5832 4348 cynyju.exe 111 PID 4348 wrote to memory of 5832 4348 cynyju.exe 111 PID 4348 wrote to memory of 5832 4348 cynyju.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_1f01035c9416593a37ef082c83ee4bbc_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\dufor.exe"C:\Users\Admin\AppData\Local\Temp\dufor.exe" hi2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\cynyju.exe"C:\Users\Admin\AppData\Local\Temp\cynyju.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\xomek.exe"C:\Users\Admin\AppData\Local\Temp\xomek.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:5832
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364B
MD54f705f9b1a23291fc228783efd55fb5a
SHA11e90757da21a19a6d2053a2e52a8e5569d404204
SHA256fe677c22507f49e20e89bcad8c9232ea95bab9f272690eb14e5f3a66019a18d3
SHA512440dc36bde4f32ee6cc4eb3d84d832f3986daed4991794c22ea2bfa8b8e0b09b4df7c016d25860217f27a77f5ce97f903b37dcee0705786ead9fa43d97c1ed60
-
Filesize
224B
MD548366e66c36efcbe08c292ddc7cf5d0b
SHA1df059db8eee0a758352d2c9c40bf7282369721c5
SHA256ec3b5aecde03dc11b2137fabe4ac5900f05186284ddc1b236fc3f3d658959738
SHA512a0367acbc9565ab4741b99a398e8e5f90e74301ce2ecf9369137e098272bbc287b8ea82cd232b056277bada56e5f8bd73a260f2c331a763f40b2774640cee24b
-
Filesize
461KB
MD56f87bb34972f7ad159b4e730e42ce99b
SHA1536e5daaf3663f1c26d9f1cac291edc812116ce8
SHA256ad7a0c315cf2b9c00fa046352c51ba56b8c5945a08fc0458266a9c8eb5eaf05e
SHA512cccc9319156453c09652bb853ee59fea5963983f6d9a73c04499d5e16b539199fd5bb001908b7c6798aa4100f638ef0aea40bab650d544fd4ee13f6821f25534
-
Filesize
461KB
MD59da5ec512194a5a0857255d9e9a64c6f
SHA16b8c557824d9b053ae0b6786e7d642243bedf545
SHA25668385e9f722b856819383daae5c6ffe7aedbc5a621ecbdc8f793d9df49320aa8
SHA512d0aac24562a22150ada5f42f43c14404ef97840cdfe7c0a0b5f7553748b55c965ce3398b0b0a5e9f3f75552077ad2ec0b9a3bad4b966fcfe9dcbd697f23d8b3b
-
Filesize
512B
MD5fae3841fd0b5ba682691ebb795f47419
SHA1d25847f10258e57955713903cd9cd8c7310a9c3d
SHA2564e7abc899312701a62cbfa3992b50a9d40dc0fe3baa146409f89251599c9ca8a
SHA512651b4302a120d9d7e26ccbb2aac8cdcdc3002b2befe45487b27b937c782f45b4cb55ab3560cae2d566ab183f3ed8e1d77f3d9f8bf11f99b62d0b5b73154370bb
-
Filesize
223KB
MD5fec3d0270895f1a924a71797da39c0e7
SHA130c15289b17084e278db5d27a43c5c1ce99721ee
SHA25688159df484d7661117bfb9a4c5d4018a9b8dd211446abe22e04847fc617c7062
SHA5127ccaec1ecd6078f5cd29bd19347c3371c535b42a58a8ed3be1557eb618690cdac55c43d07ce58f59f4a4cd50ac413ffe2cd442567be69f9c2b9647f145aee832