Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22/04/2025, 02:53

General

  • Target

    2025-04-22_f6deb7595cac0ffc23d60f549df2e388_amadey_elex_icedid_rhadamanthys_smoke-loader.exe

  • Size

    2.2MB

  • MD5

    f6deb7595cac0ffc23d60f549df2e388

  • SHA1

    0ec45cbd8d61ba548d01e465a96709462defe504

  • SHA256

    9d275d7e4c2f991a967a8c86ca2fce700bcc3b8dbbf89bfd153476a8b2c275e9

  • SHA512

    a3dc122f1a1205d8c98ec1274685872968e2eeafa09c78e7d9ff41cb58b08dda27147b789354ba3bd9691b68ebf6b2557b1718361021e215d87b9c399b5e8226

  • SSDEEP

    24576:F4YKL33onzQqK2vL+Jj/sRJF9PV6GrGkg0Rr5VkMrsTYhsCMAYQWfx5VNRem9Ke+:F6HozTKvJsnFVMkgGdu4ndBWNzEeBp2

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-22_f6deb7595cac0ffc23d60f549df2e388_amadey_elex_icedid_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-22_f6deb7595cac0ffc23d60f549df2e388_amadey_elex_icedid_rhadamanthys_smoke-loader.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Program Files\IPADTV6.EXE
      "C:\Program Files\IPADTV6.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1044
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 C:\WINDOWS\Media\ActiveX.ocx /s
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1456

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\IPADTV6.EXE

    Filesize

    304KB

    MD5

    b98bcc1c46673b77e7a4d214a7c2be51

    SHA1

    31382ca4ddd3f0eb9ffb542e834cebad1ae73e11

    SHA256

    9399dc52df64ea9d51585bd24f386c202a6b7fcfeececa5a6bc8e43e6ba93841

    SHA512

    a17fb97a411703a564dcbcec72d557b27ee31dc77f07098c976a3e36bb6138ea494785f1dd9c1daf1b1f7196c46e44d7c241b0068a7760472e082b974ebe6638

  • C:\WINDOWS\Media\ActiveX.ocx

    Filesize

    12B

    MD5

    399a9c52620675fc055c2da786485879

    SHA1

    52c9a1a91e22f986a40a3ab84f4774a0fcba7cd2

    SHA256

    e1ea0943136ac3fecaace52f1bce957e07c5c65150dcea3821d54271bf18d4ea

    SHA512

    b2772cda90436f9dbb70e68c92d4927d163232f650c432f9bf83de947b37739e9c44510a2cd92c08ebe4c5421bae19458f75a00e33eaeeba47ab611a9c45d23a

  • memory/1044-4-0x0000000002210000-0x0000000002211000-memory.dmp

    Filesize

    4KB

  • memory/1044-24-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/1044-25-0x0000000002210000-0x0000000002211000-memory.dmp

    Filesize

    4KB