Analysis
-
max time kernel
118s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 15:23
General
-
Target
2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe
-
Size
114KB
-
MD5
eddf025c78321b91f563ff1017d628ba
-
SHA1
e40904cd9c43f63fb3e6a30a501fd288ae32197c
-
SHA256
87a88dbb109cef4ac3bed2f20f787e48a1d7ce510be0a2c335b0d0b1125765b9
-
SHA512
38dbe29303068d571125e043b39e7f5bafc1b339aa0e926f3d72202d5f85921ab19377e535ea78b597eb2dd5cfd71111bf446e02db1a76564685a64a8ecb986a
-
SSDEEP
1536:Loaj1hJL1S9t0MIeboal8bCKxo7h0RPLJNz30rtriCr0nJnHPoq1nouy8TRgJ:c0hpgz6xGhYJF30Blr0nhoutTRgJ
Malware Config
Signatures
-
Sakula family
-
Sakula payload 7 IoCs
resource yara_rule behavioral1/memory/5892-0-0x0000000000710000-0x0000000000731000-memory.dmp family_sakula behavioral1/memory/5484-4-0x0000000000C60000-0x0000000000C81000-memory.dmp family_sakula behavioral1/files/0x0008000000024208-3.dat family_sakula behavioral1/memory/5892-7-0x0000000000710000-0x0000000000731000-memory.dmp family_sakula behavioral1/memory/5484-8-0x0000000000C60000-0x0000000000C81000-memory.dmp family_sakula behavioral1/memory/896-9-0x0000000000C60000-0x0000000000C81000-memory.dmp family_sakula behavioral1/memory/5892-10-0x0000000000710000-0x0000000000731000-memory.dmp family_sakula -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Control Panel\International\Geo\Nation 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe -
Executes dropped EXE 2 IoCs
pid Process 5484 MediaCenter.exe 896 MediaCenter.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe -
resource yara_rule behavioral1/memory/5892-0-0x0000000000710000-0x0000000000731000-memory.dmp upx behavioral1/memory/5484-4-0x0000000000C60000-0x0000000000C81000-memory.dmp upx behavioral1/files/0x0008000000024208-3.dat upx behavioral1/memory/5892-7-0x0000000000710000-0x0000000000731000-memory.dmp upx behavioral1/memory/5484-8-0x0000000000C60000-0x0000000000C81000-memory.dmp upx behavioral1/memory/896-9-0x0000000000C60000-0x0000000000C81000-memory.dmp upx behavioral1/memory/5892-10-0x0000000000710000-0x0000000000731000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MediaCenter.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4720 cmd.exe 4808 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4808 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5892 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5892 wrote to memory of 5484 5892 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe 84 PID 5892 wrote to memory of 5484 5892 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe 84 PID 5892 wrote to memory of 5484 5892 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe 84 PID 2436 wrote to memory of 896 2436 cmd.exe 86 PID 2436 wrote to memory of 896 2436 cmd.exe 86 PID 2436 wrote to memory of 896 2436 cmd.exe 86 PID 5892 wrote to memory of 4720 5892 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe 91 PID 5892 wrote to memory of 4720 5892 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe 91 PID 5892 wrote to memory of 4720 5892 2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe 91 PID 4720 wrote to memory of 4808 4720 cmd.exe 93 PID 4720 wrote to memory of 4808 4720 cmd.exe 93 PID 4720 wrote to memory of 4808 4720 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5892 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\2025-04-11_eddf025c78321b91f563ff1017d628ba_amadey_elex_rhadamanthys_sakula_smoke-loader.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:896
-
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD55683d952e24a44779e9deada2c8f63a8
SHA132154b5a2836b8ea1838cd97b1aeff8ef05b270e
SHA25629b52e4e19ff5729783d1d0f5f9bb5b9cc71e2341d116cc882c7fbfe5d5a34cd
SHA5123a97741361af6244ce928a3d38e52de6f709e9ae7af83a30919d32f48734176adec7cf59a4ad43d5827de811c927f9816780169059ffc099cda0aec442790608