Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21/04/2025, 17:05

General

  • Target

    2025-04-21_015a78dc334f5de78159f87886e15285_amadey_elex_icedid_rhadamanthys_smoke-loader.exe

  • Size

    2.2MB

  • MD5

    015a78dc334f5de78159f87886e15285

  • SHA1

    69ae6f823e219c1325e4a85382a13477abaa62b0

  • SHA256

    9aad4aeab8be787636e14dbfe509b88a4b684246190285bb9cfc7df95080ab02

  • SHA512

    4ca47858033d4a15ef06c16ce6ec67c8d41aca2793f77bfda7ad906281c641b6fe12705cada89a4eab2b82080607a625fd83ba38ec71c70015e192ef56cbdb3b

  • SSDEEP

    24576:F4YKL33onzQqK2vL+Jj/sRJF9PV6GrGkg0Rr5VkMrsTYhsCMAYQWfx5VNRem9KeD:F6HozTKvJsnFVMkgGdu4ndBWNzEeBpr

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-21_015a78dc334f5de78159f87886e15285_amadey_elex_icedid_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-21_015a78dc334f5de78159f87886e15285_amadey_elex_icedid_rhadamanthys_smoke-loader.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Program Files\IPADTV6.EXE
      "C:\Program Files\IPADTV6.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:836
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 C:\WINDOWS\Media\ActiveX.ocx /s
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4360

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\IPADTV6.EXE

    Filesize

    304KB

    MD5

    b98bcc1c46673b77e7a4d214a7c2be51

    SHA1

    31382ca4ddd3f0eb9ffb542e834cebad1ae73e11

    SHA256

    9399dc52df64ea9d51585bd24f386c202a6b7fcfeececa5a6bc8e43e6ba93841

    SHA512

    a17fb97a411703a564dcbcec72d557b27ee31dc77f07098c976a3e36bb6138ea494785f1dd9c1daf1b1f7196c46e44d7c241b0068a7760472e082b974ebe6638

  • C:\WINDOWS\Media\ActiveX.ocx

    Filesize

    12B

    MD5

    269debdf30a832263b09a1b239209fcd

    SHA1

    2cee655089cde02ee9d58665b427c7158eccdf5e

    SHA256

    4b369d4ee7f9319540e3969b46ec74d5510086575268ad95da39464d233a7b52

    SHA512

    8f85ddd224847293ae0392244d56d5cbec4f689473e1d1893d26b1517bd1ad994f8de3d52db43fdbf72371f5fd10f34bc5761d6d4514eafdf7c4e6c3e2c6dd35

  • memory/836-4-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/836-24-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/836-25-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB