Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2025, 05:14
General
-
Target
2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe
-
Size
333KB
-
MD5
56ce1302f40520f19ed3a83ff2c94db0
-
SHA1
4f982dfeff51f02b7a39e76af4491bfef6f1e303
-
SHA256
ed38d345e27a67bd75b98b4397a24c557c97e7036a22c0845f7aba8cf4073ca9
-
SHA512
5cfdaf35537bcd4d4d30c976cbae6d3c0f7b9dd64c96156762f560e4f399f218f08f77f4e6d70696e5659807de39d9f0ccfa3fcb0d2936b7589e6a979f116c16
-
SSDEEP
3072:NdXi+V5Kgxpdxj8gbib20xTyst542t8ZHWBow8+zoB91wDQgJl0x2AEMenKbZisi:Nd7rpL43btmQ58Z27zw39gY2FeZhmzv
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Urelas family
-
resource yara_rule behavioral1/files/0x0011000000023dd9-31.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation 2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation gonif.exe Key value queried \REGISTRY\USER\S-1-5-21-3218366390-1258052702-4267193707-1000\Control Panel\International\Geo\Nation fiwuze.exe -
Executes dropped EXE 3 IoCs
pid Process 3736 gonif.exe 1436 fiwuze.exe 4276 yvtut.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gonif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fiwuze.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yvtut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe 4276 yvtut.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3736 2232 2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe 87 PID 2232 wrote to memory of 3736 2232 2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe 87 PID 2232 wrote to memory of 3736 2232 2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe 87 PID 2232 wrote to memory of 3268 2232 2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe 88 PID 2232 wrote to memory of 3268 2232 2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe 88 PID 2232 wrote to memory of 3268 2232 2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe 88 PID 3736 wrote to memory of 1436 3736 gonif.exe 90 PID 3736 wrote to memory of 1436 3736 gonif.exe 90 PID 3736 wrote to memory of 1436 3736 gonif.exe 90 PID 1436 wrote to memory of 4276 1436 fiwuze.exe 110 PID 1436 wrote to memory of 4276 1436 fiwuze.exe 110 PID 1436 wrote to memory of 4276 1436 fiwuze.exe 110 PID 1436 wrote to memory of 1580 1436 fiwuze.exe 111 PID 1436 wrote to memory of 1580 1436 fiwuze.exe 111 PID 1436 wrote to memory of 1580 1436 fiwuze.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-04_56ce1302f40520f19ed3a83ff2c94db0_amadey_rhadamanthys_smoke-loader.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\gonif.exe"C:\Users\Admin\AppData\Local\Temp\gonif.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\fiwuze.exe"C:\Users\Admin\AppData\Local\Temp\fiwuze.exe" OK3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\yvtut.exe"C:\Users\Admin\AppData\Local\Temp\yvtut.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:3268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364B
MD52e64ade77eeb7c5fd00dac3257469c93
SHA10a12443b9d526012cb103d232d47850d075cfbbd
SHA2565b5472337e04f6d5ac96ea3a8b742260c97039ddb8fc040ad045244e30122040
SHA512d5d3038d5c887a4b433a7637dc36f932e74383fa2373be6506d65e3424621523a0bd5c2c68549c33c9bf72ae632cc30385cd422e9e7da9d526420740962d0b96
-
Filesize
224B
MD5fdf77cba6f3eca67583a6a2ff0c9ce61
SHA19052e8d54059981aef5c84e0703ad2bc80904869
SHA2564b110ddec48eb42f847d4701a5d210db262594ac5fd9bb7f105b5770da7daca7
SHA512f42f05f8d541a2a41d3ddb3fdf347bfab227bfb2cd93fee316fb0ff6cc1d800df5859fd12333f0d6090631dde3a23033ea3b8f371db90ffd769f08380fa5e8f0
-
Filesize
512B
MD556a484a6f1457a753ce2dc501e266264
SHA1f1469c1b3cc13edf41e68aae8cc8cbc79ef5d2e1
SHA25676cd1dc7992dee8e3b4aafeb4d0feb9111d40c7dee4626eb6fdb6fafc5833a6a
SHA5126aace78b1308311bba8a347e6c87559d4076f015e01ad11131bc9ffe9ac97dc68b139c3d6c6de2dbf44682f22f407c3123ca23047a8f4071c99e1c3f5685abcc
-
Filesize
333KB
MD5fc3332558a43c1b1509111f9fc0a3d38
SHA1c515f443104e535239bf5423018699ddf43e251d
SHA256a84c9f94aaa9ef54dfdf87158f44230ec9b4598a11ac64f3b3fb957f51b2b0a7
SHA512149af25cf1896c91742034f505a1748c22098f193e6d7054d78385a0212df34e3819b58a81a2afb6b0974418fb16e38bcf09a69d83eacdc3b040c98a020298ec
-
Filesize
136KB
MD5729148d076680a9f867a096ce5b5d7cc
SHA1d096b0eacfd3c2a45130dc670685b826ea7e6325
SHA2568e9062c213e1b5a15974ad7f994f9184976a65c3240cf10b835f45ea7c10cf15
SHA512f40da2da1a4fe865261ab87b2a2c9e4ae4bc066db5bad42704d8140ecf4999cd51b76912b01df16d3fefce5910bb09812bf121f6a5c8a6146e6e6c253a00d80d