Analysis

  • max time kernel
    150s
  • max time network
    106s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250410-en
  • resource tags

    arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    22/04/2025, 04:42

General

  • Target

    2025-04-22_cef1a42a6084ac6969ad418256e76961_amadey_elex_icedid_rhadamanthys_smoke-loader.exe

  • Size

    2.2MB

  • MD5

    cef1a42a6084ac6969ad418256e76961

  • SHA1

    ad36c6f687478405ebf3c346ddea399590cfa92b

  • SHA256

    c10a7fbb6275bfe9ce6b6bc50621c90eb035925ded44aabfd128305bcad681eb

  • SHA512

    745a6aa88b931e1d8ecba9b3b79d7bf9153be0ed855ba5dbbd8fdbbdf390e46c8a382de46b2e00fe55de2c91ba66ce532615a361f7047a2461c810a9e5fb1bd0

  • SSDEEP

    24576:F4YKL33onzQqK2vL+Jj/sRJF9PV6GrGkg0Rr5VkMrsTYhsCMAYQWfx5VNRem9KeG:F6HozTKvJsnFVMkgGdu4ndBWNzEeBpu

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-04-22_cef1a42a6084ac6969ad418256e76961_amadey_elex_icedid_rhadamanthys_smoke-loader.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-04-22_cef1a42a6084ac6969ad418256e76961_amadey_elex_icedid_rhadamanthys_smoke-loader.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • NTFS ADS
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:5364
    • C:\Program Files\IPADTV6.EXE
      "C:\Program Files\IPADTV6.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2432
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 C:\WINDOWS\Media\ActiveX.ocx /s
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3400

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\IPADTV6.EXE

    Filesize

    304KB

    MD5

    b98bcc1c46673b77e7a4d214a7c2be51

    SHA1

    31382ca4ddd3f0eb9ffb542e834cebad1ae73e11

    SHA256

    9399dc52df64ea9d51585bd24f386c202a6b7fcfeececa5a6bc8e43e6ba93841

    SHA512

    a17fb97a411703a564dcbcec72d557b27ee31dc77f07098c976a3e36bb6138ea494785f1dd9c1daf1b1f7196c46e44d7c241b0068a7760472e082b974ebe6638

  • C:\WINDOWS\Media\ActiveX.ocx

    Filesize

    12B

    MD5

    bc8d476558f88aae6fe3829d0eb67967

    SHA1

    3c99c9dc2f180ba08e1f832b0367563296cd4175

    SHA256

    f14485322796e6b252ac03ad981b6d3404ae51f005d0c115e7f79abf59b47853

    SHA512

    ca2b761220054656f14e9d084793983596ff25134bbb02e5d33cc2b73fa0f45d8e4cd85d7d9fa734ef2971808a29c66daa02e2d06cc40a77c60f16ef42afaa7d

  • memory/2432-4-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/2432-23-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2432-24-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB