Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2025, 14:35

General

  • Target

    2025-04-05_e873d3db9c5dedf47bb49b01711f53d7_amadey_smoke-loader.exe

  • Size

    23.0MB

  • MD5

    e873d3db9c5dedf47bb49b01711f53d7

  • SHA1

    08e06fc6afa397e431ad7ca4c0e3265acf713948

  • SHA256

    7b2bca7cd4dea6c148024bc91d0918b28f9993462cc7199aa6ee32256f0d2b80

  • SHA512

    6897c2351f4b73ad641621ed819c6086249922d3cd9fde3bef5770cb0415176ea4ab49291b2b212342607c82ddadb3e583ad2280bb05d9f6445155d2930cce30

  • SSDEEP

    393216:Q8t/QCMfMwqfGr8vOu7deqcbOL78sJwf5tyDAn5aYKLW6:n1QtUwJu5eNo0f5EDAn1KR

Malware Config

Extracted

Family

remcos

Version

2.5.0 Pro

Botnet

Spot1511

C2

nvdiedico.knowsitall.info:3297

dico.is-a-hard-worker.com:3297

roxy.is-by.us:3297

nicholds.dyndns-web.com:3297

nvdiedicozeus.dyndns-web.com:3297

nvdieroxy.servebbs.org:3297

nvdiedicob.is-a-chef.org:3297

nerverdieorcus.is-a-doctor.com:3297

Attributes
  • audio_folder

    MicRecords

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    rmlogs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    Rmxplgdatas-ORUCBL

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

  • take_screenshot_title

    wikipedia;solitaire;

Extracted

Family

netwire

C2

wire.mine.nu:9702

dico.is-very-bad.org:9702

roxy.dynalias.net:9702

regiskm67.buyshouses.net:9702

zeusnodie.mypets.ws:9702

nvdiedicobies.is-a-hard-worker.com:9702

nvdieroxy.kicks-ass.net:9702

nvdiedicozeuse.webhop.org:9702

Attributes
  • activex_autorun

    false

  • copy_executable

    false

  • delete_original

    false

  • host_id

    Spot1411

  • keylogger_dir

    %AppData%\Logs\

  • lock_executable

    false

  • mutex

    Entubebd

  • offline_keylogger

    true

  • password

    0000

  • registry_autorun

    false

  • use_mutex

    true

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Netwire family
  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-05_e873d3db9c5dedf47bb49b01711f53d7_amadey_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-05_e873d3db9c5dedf47bb49b01711f53d7_amadey_smoke-loader.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Roaming\nb673-full.exe
      "C:\Users\Admin\AppData\Roaming\nb673-full.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      PID:4296
    • C:\Users\Admin\AppData\Roaming\RxWindriver.exe
      "C:\Users\Admin\AppData\Roaming\RxWindriver.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5896
      • C:\Users\Admin\AppData\Local\Temp\97028583\wqmvjkujg.bat
        "C:\Users\Admin\AppData\Local\Temp\97028583\wqmvjkujg.bat" suwbmcn.eme
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1588
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1532
    • C:\Users\Admin\AppData\Roaming\Netframework.exe
      "C:\Users\Admin\AppData\Roaming\Netframework.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Users\Admin\AppData\Local\Temp\02611875\dhidhbrvsi.cmd
        "C:\Users\Admin\AppData\Local\Temp\02611875\dhidhbrvsi.cmd" sktfl.wts
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4436
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\97028583\WQMVJK~1.BAT C:\Users\Admin\AppData\Local\Temp\97028583\suwbmcn.eme
    1⤵
      PID:4912
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\02611875\DHIDHB~1.CMD C:\Users\Admin\AppData\Local\Temp\02611875\sktfl.wts
      1⤵
        PID:1980

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\02611875\jalabegr.txt

        Filesize

        269KB

        MD5

        6f3aa0896874ab108c07673ff22978bd

        SHA1

        787c20c688a551560c1119581da7bcc1aa754dad

        SHA256

        8f3c8402a49c242cad6162f1c4f178cd7d2c7aa23bb34fea473144f2e3c438af

        SHA512

        28e403c1373c8c282ed57a034b25a258503caf669669aaf7bd869db340be8120f910724c79ceb8a0f010a9d58cb4000e4cd932b223df69c3b7bef3194bceea34

      • C:\Users\Admin\AppData\Local\Temp\97028583\nrveb.msc

        Filesize

        308KB

        MD5

        8296a539bec586333a216bca6dba8bbd

        SHA1

        696098c5bde90f2fda807dd7b42a744ee55965a7

        SHA256

        aa05bf9b4485d0cc21eb8881828136cca038ce7676bd1aa0e3df2bd60e80efc1

        SHA512

        c31cc0466f549e42672fe4d5aa9c8a24383210a6db1e4d141678170666711b3b9dec3d9400e7c18c8e2c5710ca7d2c859597ccefd04d8b2fecd44424428585e4

      • C:\Users\Admin\AppData\Local\Temp\97028583\wqmvjkujg.bat

        Filesize

        732KB

        MD5

        71d8f6d5dc35517275bc38ebcc815f9f

        SHA1

        cae4e8c730de5a01d30aabeb3e5cb2136090ed8d

        SHA256

        fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b

        SHA512

        4826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59

      • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

        Filesize

        44KB

        MD5

        9d352bc46709f0cb5ec974633a0c3c94

        SHA1

        1969771b2f022f9a86d77ac4d4d239becdf08d07

        SHA256

        2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

        SHA512

        13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

      • C:\Users\Admin\AppData\Local\Temp\nsf54B8.tmp\GetFLE.ini

        Filesize

        941B

        MD5

        d9a4e7078565a08bc7634ddca27566f7

        SHA1

        75e214bfa5de0b4257ca69088606242ccca8a687

        SHA256

        3ae472e55c8271096800187336a9929ae0c60bb063262554f598b51710fe5d76

        SHA512

        6f553cead9003d9fc5b2657de393e3ec312dcdb7a8bb32a411dd7a7fe64e962705a60efb563238eeaf090fea18aae11dfb788054b94162806d2cbe3b94847db1

      • C:\Users\Admin\AppData\Local\Temp\nsf54B8.tmp\InstallOptions.dll

        Filesize

        14KB

        MD5

        3e277798b9d8f48806fbb5ebfd4990db

        SHA1

        d1ab343c5792bc99599ec7acba506e8ba7e05969

        SHA256

        fe19353288a08a5d2640a9c022424a1d20e4909a351f2114423e087313a40d7c

        SHA512

        84c9d4e2e6872277bffb0e10b292c8c384d475ad163fd0a47ca924a3c79077dfde880f535a171660f73265792554129161d079a10057d44e28e2d57ebc477e92

      • C:\Users\Admin\AppData\Local\Temp\nsf54B8.tmp\LangDLL.dll

        Filesize

        5KB

        MD5

        b26b412d9f1050ad53f663c972fdcd9f

        SHA1

        7bc4ed444f3f8fd14c2c36784d828175bace8c17

        SHA256

        70c842f318f691d92e5829616a283aa9bf9dc18cea6f39bad028e176056b591a

        SHA512

        ba350a10b41c0cfe34c502e3d0e68fbfe1489448c85a282e0a5e444fa58d0dd8be2e566e21f0734a0debfc454f08b84140964c09c4c952f6a442642c911d7b46

      • C:\Users\Admin\AppData\Local\Temp\nsf54B8.tmp\System.dll

        Filesize

        11KB

        MD5

        3f176d1ee13b0d7d6bd92e1c7a0b9bae

        SHA1

        fe582246792774c2c9dd15639ffa0aca90d6fd0b

        SHA256

        fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e

        SHA512

        0a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6

      • C:\Users\Admin\AppData\Local\Temp\nsf54B8.tmp\UAC.dll

        Filesize

        14KB

        MD5

        4814167aa1c7ec892e84907094646faa

        SHA1

        a57a5ecbdfa9a8777a3c587f1acb02b783afc5ee

        SHA256

        32dd7269abf5a0e5db888e307d9df313e87cef4f1b597965a9d8e00934658822

        SHA512

        fb1f35e393997ecd2301f371892b59574ee6b666095c3a435336160481f6ef7ed5635c90ce5d2cf88e5ef4a5affb46cb841b7d17e7981bd6e998531193f5d067

      • C:\Users\Admin\AppData\Local\Temp\nsf54B8.tmp\UserInfo.dll

        Filesize

        4KB

        MD5

        c22c9d7b6937b8960fba4c8a145076b2

        SHA1

        2e45c2dd6e5132a942fe940dccdaf771e0f9e81e

        SHA256

        510e466a715933499fb9d5a1753b483826b2bf89161b9d466dd2ad7e52ede2fc

        SHA512

        b3b93fb97bc0d16ac35a1f0e877bcf42324e19d21839b025329d1b27d8e96bc9c0cbde0a8d60b23fd0c864f62e3c287461108c6abecf53ac488de1fc16b47d6e

      • C:\Users\Admin\AppData\Local\Temp\nsf54B8.tmp\cpudesc.dll

        Filesize

        4KB

        MD5

        d25102051b33f61c9f7fb564a4556219

        SHA1

        c683964c11d5175171bd009cb08f87592c923f85

        SHA256

        e58e5d1d8da2ea526d0d754b4faad3773021166b0720723efb7b30f1f5075398

        SHA512

        8828eec31926251d7e51b5bf1050c3519c9b7fca4f978fb6ee0bf18f9642c3460687f10ff79e5892100ecadbf49725711567c348e1dfccb3644bd9ef992a92f0

      • C:\Users\Admin\AppData\Local\Temp\nsf54B8.tmp\nsDialogs.dll

        Filesize

        9KB

        MD5

        b3070cf20db659fdfb3cb2ed38130e8d

        SHA1

        aa234b0620bebddde1414ff6b0840d883890b413

        SHA256

        f2c1409faf2952c1c91f4b5495158ef5c7d1a1db6eea4a18f163574bd52fcad0

        SHA512

        4849a4cf24ea8a26cd04eb132d479cc093d4e204ed3866a77646d03778f4c128e20722a0c3cd62ea98a37deea4ce505fe632420158c71a10b0c8c5e32b38e3f1

      • C:\Users\Admin\AppData\Roaming\Netframework.exe

        Filesize

        1.4MB

        MD5

        6b60dfc1c2ff57eb2a32423995c766e8

        SHA1

        adcd8abb899c4e009216384dcf1f54ed5ba52819

        SHA256

        b21f28cf27f33b0ef78a2b1a5040f48fe8a13e5553ee870b1a77d8aefc7aa81b

        SHA512

        7d303c9eb3953173694ac6a87aa5dc4eeb1a21ed480a48e776dfbec5822468bcec84ccece786ab7a3483a3e4e4824462444535d23bf23e42cf67bd4a5707cb0b

      • C:\Users\Admin\AppData\Roaming\RxWindriver.exe

        Filesize

        1.4MB

        MD5

        d323f3245223177b63de1ecbe3f47663

        SHA1

        ed7c2f0a5bd951b946a471cc7d5771ce6a5f61dc

        SHA256

        f82e132f601da9270a40d268809974af7aa406a75e2fa63075a9c3fa3e35673c

        SHA512

        c3b7a7e6b0b95e3ef3cc9766430596d812ce5844ed45c0ad016b6998aa4e7e71602cf2f4b16100aac4406bef2255f5c88354b87cc3cfbfbace50b06974ec9d79

      • C:\Users\Admin\AppData\Roaming\nb673-full.exe

        Filesize

        15.8MB

        MD5

        de277032de998ff27f75e0cbfb4b7b6b

        SHA1

        9d88f2fa882e9c22a353e13387bd7f7005ade51d

        SHA256

        47297aac91fa6670efb15c70c80e99656b3fbc5598c2e93304225bbbe6f1a266

        SHA512

        b1cb388f356e929c8bde60770e8a0404f0c4c39b724004fd80001a5f0637e892991cc4c0a807cb8358fa0bdbe4cf9819ece0a5ab9503d0103f08d32e7e4d2514

      • C:\Users\Admin\AppData\Roaming\remcos\rmlogs.dat

        Filesize

        77B

        MD5

        4c5edb1f157a3aaf2afea7479106ad1c

        SHA1

        b539b523488cd28ed17cd9e27259e1784cfe11b0

        SHA256

        c479e58a988ec07bb3dc3536c10f584df0d3530d16aaf8b7c208d7b6f7be2edf

        SHA512

        f18ace9c6c929230deea64cff5a91b27a79e8e13053f8d480daa64060dd66e7f6bf6aab58039c0a1d3192ae804d769e7af4152a808379cc2e9de132be3116a54

      • memory/1532-316-0x0000000000B00000-0x0000000001B00000-memory.dmp

        Filesize

        16.0MB

      • memory/1532-320-0x0000000000B00000-0x0000000001B00000-memory.dmp

        Filesize

        16.0MB

      • memory/1532-314-0x0000000000B00000-0x0000000001B00000-memory.dmp

        Filesize

        16.0MB

      • memory/1532-319-0x0000000000B00000-0x0000000001B00000-memory.dmp

        Filesize

        16.0MB

      • memory/4436-324-0x0000000000D00000-0x0000000001D00000-memory.dmp

        Filesize

        16.0MB

      • memory/4436-322-0x0000000000D00000-0x0000000001D00000-memory.dmp

        Filesize

        16.0MB