Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2025, 02:53

General

  • Target

    2025-04-22_f6deb7595cac0ffc23d60f549df2e388_amadey_elex_icedid_rhadamanthys_smoke-loader.exe

  • Size

    2.2MB

  • MD5

    f6deb7595cac0ffc23d60f549df2e388

  • SHA1

    0ec45cbd8d61ba548d01e465a96709462defe504

  • SHA256

    9d275d7e4c2f991a967a8c86ca2fce700bcc3b8dbbf89bfd153476a8b2c275e9

  • SHA512

    a3dc122f1a1205d8c98ec1274685872968e2eeafa09c78e7d9ff41cb58b08dda27147b789354ba3bd9691b68ebf6b2557b1718361021e215d87b9c399b5e8226

  • SSDEEP

    24576:F4YKL33onzQqK2vL+Jj/sRJF9PV6GrGkg0Rr5VkMrsTYhsCMAYQWfx5VNRem9Ke+:F6HozTKvJsnFVMkgGdu4ndBWNzEeBp2

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-22_f6deb7595cac0ffc23d60f549df2e388_amadey_elex_icedid_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-22_f6deb7595cac0ffc23d60f549df2e388_amadey_elex_icedid_rhadamanthys_smoke-loader.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Program Files\IPADTV6.EXE
      "C:\Program Files\IPADTV6.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4660
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 C:\WINDOWS\Media\ActiveX.ocx /s
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5728

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\IPADTV6.EXE

    Filesize

    304KB

    MD5

    b98bcc1c46673b77e7a4d214a7c2be51

    SHA1

    31382ca4ddd3f0eb9ffb542e834cebad1ae73e11

    SHA256

    9399dc52df64ea9d51585bd24f386c202a6b7fcfeececa5a6bc8e43e6ba93841

    SHA512

    a17fb97a411703a564dcbcec72d557b27ee31dc77f07098c976a3e36bb6138ea494785f1dd9c1daf1b1f7196c46e44d7c241b0068a7760472e082b974ebe6638

  • C:\WINDOWS\Media\ActiveX.ocx

    Filesize

    12B

    MD5

    82a7b9502e5d96fb84465e493914e60c

    SHA1

    1ae32d3b241321b7549fee245cfd26b4fa832732

    SHA256

    60783d35649a205049282d8be1bf11a4a53b1acc97d8824f64ca753212776d05

    SHA512

    97df54ba44359787ad49826142bf8e14ad14a8e0290b6ab3c02371d8004f0bb6b94cec62a7638bba723b776997261244f5a47ebfb0b12cdf952bfb943ef9a459

  • memory/4660-4-0x0000000002210000-0x0000000002211000-memory.dmp

    Filesize

    4KB

  • memory/4660-25-0x0000000002210000-0x0000000002211000-memory.dmp

    Filesize

    4KB

  • memory/4660-24-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB