Malware Analysis Report

2025-05-28 15:16

Sample ID 250515-jq4nha1qy2
Target 2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader
SHA256 12965c4f94374db8d6722d51a11b15cd13beb395192b8094c75b45343c08dbf3
Tags
phorphiex xmrig defense_evasion discovery execution loader miner persistence trojan upx worm
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

12965c4f94374db8d6722d51a11b15cd13beb395192b8094c75b45343c08dbf3

Threat Level: Known bad

The file 2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader was found to be: Known bad.

Malicious Activity Summary

phorphiex xmrig defense_evasion discovery execution loader miner persistence trojan upx worm

Phorphiex payload

Xmrig family

xmrig

Phorphiex family

Phorphiex, Phorpiex

XMRig Miner payload

Downloads MZ/PE file

Stops running service(s)

Creates new service(s)

Executes dropped EXE

Adds Run key to start application

UPX packed file

Suspicious use of SetThreadContext

Drops file in Windows directory

Launches sc.exe

System Location Discovery: System Language Discovery

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-05-15 07:53

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-05-15 07:53

Reported

2025-05-15 07:55

Platform

win10v2004-20250502-en

Max time kernel

120s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe"

Signatures

Phorphiex family

phorphiex

Phorphiex payload

Description Indicator Process Target
N/A N/A N/A N/A

Phorphiex, Phorpiex

worm trojan loader phorphiex

Xmrig family

xmrig

xmrig

miner xmrig

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Creates new service(s)

persistence execution

Stops running service(s)

defense_evasion execution

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\syscrondvr.exe" C:\Users\Admin\AppData\Local\Temp\356321798.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2904 set thread context of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 set thread context of 3984 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\356321798.exe N/A
File opened for modification C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\356321798.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\syscrondvr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\3340922858.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\6A62.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\356321798.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1512 wrote to memory of 2316 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe C:\Users\Admin\AppData\Local\Temp\6A62.exe
PID 1512 wrote to memory of 2316 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe C:\Users\Admin\AppData\Local\Temp\6A62.exe
PID 1512 wrote to memory of 2316 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe C:\Users\Admin\AppData\Local\Temp\6A62.exe
PID 2316 wrote to memory of 5440 N/A C:\Users\Admin\AppData\Local\Temp\6A62.exe C:\Users\Admin\AppData\Local\Temp\356321798.exe
PID 2316 wrote to memory of 5440 N/A C:\Users\Admin\AppData\Local\Temp\6A62.exe C:\Users\Admin\AppData\Local\Temp\356321798.exe
PID 2316 wrote to memory of 5440 N/A C:\Users\Admin\AppData\Local\Temp\6A62.exe C:\Users\Admin\AppData\Local\Temp\356321798.exe
PID 5440 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\356321798.exe C:\Windows\syscrondvr.exe
PID 5440 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\356321798.exe C:\Windows\syscrondvr.exe
PID 5440 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\356321798.exe C:\Windows\syscrondvr.exe
PID 5752 wrote to memory of 1992 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 5752 wrote to memory of 1992 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 5752 wrote to memory of 1992 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 2604 wrote to memory of 4968 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\3340922858.exe
PID 2604 wrote to memory of 4968 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\3340922858.exe
PID 2604 wrote to memory of 4968 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\3340922858.exe
PID 4968 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Local\Temp\3340922858.exe C:\Users\Admin\AppData\Local\Temp\2307110849.exe
PID 4968 wrote to memory of 5072 N/A C:\Users\Admin\AppData\Local\Temp\3340922858.exe C:\Users\Admin\AppData\Local\Temp\2307110849.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3828 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 2904 wrote to memory of 3984 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2904 wrote to memory of 3984 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2904 wrote to memory of 3984 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2904 wrote to memory of 3984 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 2904 wrote to memory of 3984 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe

"C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe"

C:\Users\Admin\AppData\Local\Temp\6A62.exe

"C:\Users\Admin\AppData\Local\Temp\6A62.exe"

C:\Users\Admin\AppData\Local\Temp\356321798.exe

C:\Users\Admin\AppData\Local\Temp\356321798.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Users\Admin\AppData\Local\Temp\3340922858.exe

C:\Users\Admin\AppData\Local\Temp\3340922858.exe

C:\Users\Admin\AppData\Local\Temp\2307110849.exe

C:\Users\Admin\AppData\Local\Temp\2307110849.exe

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe delete "MgrSrvdrvcs"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe create "MgrSrvdrvcs" binpath= "C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe" start= "auto"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop eventlog

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe start "MgrSrvdrvcs"

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

C:\Windows\system32\conhost.exe

C:\Windows\system32\conhost.exe

C:\Windows\system32\dwm.exe

dwm.exe

Network

Country Destination Domain Proto
UA 185.156.72.39:80 185.156.72.39 tcp
IE 2.19.176.88:443 www.bing.com tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
NL 45.141.233.6:80 45.141.233.6 tcp
US 8.8.8.8:53 c.pki.goog udp
FR 142.251.37.35:80 c.pki.goog tcp
US 8.8.8.8:53 www.update.microsoft.com udp
US 20.72.235.82:80 www.update.microsoft.com tcp
IR 5.53.32.26:40500 udp
IR 5.236.54.150:40500 tcp
DZ 41.108.126.246:40500 udp
MX 187.140.148.108:40500 udp
IN 134.35.224.8:40500 udp
IR 93.115.228.165:40500 udp
CN 218.202.215.94:40500 udp
IR 2.179.220.187:40500 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UZ 195.158.21.74:40500 udp
IR 5.233.199.82:40500 udp
UZ 89.236.218.158:40500 tcp
UA 185.156.72.39:5151 tcp
KZ 5.76.159.180:40500 udp
MX 187.194.169.243:40500 udp
PK 175.107.23.34:40500 udp
RU 94.245.163.195:40500 udp
IR 46.21.87.136:40500 udp
KZ 91.246.97.146:40500 tcp
YE 78.137.67.141:40500 udp
IR 2.181.195.182:40500 udp
IR 5.219.230.137:40500 udp

Files

C:\Users\Admin\AppData\Local\Temp\6A62.exe

MD5 0ec46393976eb51f307cc11d80bae845
SHA1 69d4cb168f3a1b97c37a0ba1519d0adb1ff7e245
SHA256 252171bdaa35d19f872c165e861b03d347a4afb85d7a03d02f8eae09d191038d
SHA512 803351760e3c422e4825103235e13085004b3418b483a2c646aafaef62b7212a1ba4ed28469134a236c5b6121e6a748ba958bbae2dbe4afe9f9f45704928d31f

C:\Users\Admin\AppData\Local\Temp\356321798.exe

MD5 f30fdbf3448f67cbc3566f31729cb7a6
SHA1 fbf005c38f4a1c2e86817a2cb70406fc241f2c90
SHA256 81783b558904becc5b86553faba9525070de5f43339766eb1c025bcfbfe1eef8
SHA512 b428df2c8f8b4a002c8d7e1bfd9926e5cf95ee998688a2c360b8551e80be5bfbfa17ef210bea35f247da4a5c8a940fb5dba49f4786da9a74e5d001b771c8e9a8

C:\Users\Admin\AppData\Local\Temp\3340922858.exe

MD5 c08cfa523c9377d3ae24fdb373b3ae13
SHA1 5289219770ad28b0fa4f0bdd91817f76bd6be222
SHA256 326c70a965d4e642275c26cd913e268b1db89edd59b31a86ee600a7a9c664eb0
SHA512 c91acd580ac832d5fed363a9a2b98b724a255d82e4fdda6eca62133feb5e60dd79a8caca36597a52bfbfa907a44208c48b15142e2e6020db219d14e970c3f57c

C:\Users\Admin\AppData\Local\Temp\2307110849.exe

MD5 0000638ebbfe0d620abe6ca32abb1b58
SHA1 ae908681544765eb238e92b4ff7df26884692aa0
SHA256 267ec6176c1111d9ffcf32fcfa6aa65917e64d1556dcbbd8989ee6bbebc2e72f
SHA512 1522ed6c96d0a6699aaf5c1e6e3956742f26e8b46f2c795c0b6cfd3c02421aa6101134ded49c6b97e4085a789056cfb2d0fa09630c1c8796c7fc8d49aef66212

memory/3828-38-0x0000000140000000-0x000000014000D000-memory.dmp

memory/3828-37-0x0000000140000000-0x000000014000D000-memory.dmp

memory/3828-36-0x0000000140000000-0x000000014000D000-memory.dmp

memory/3828-35-0x0000000140000000-0x000000014000D000-memory.dmp

memory/3828-34-0x0000000140000000-0x000000014000D000-memory.dmp

memory/3828-41-0x0000000140000000-0x000000014000D000-memory.dmp

memory/3984-45-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-44-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-49-0x0000028586620000-0x0000028586640000-memory.dmp

memory/3984-46-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-42-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-43-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-48-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-50-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-51-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-52-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-47-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-53-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-54-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-64-0x0000000140000000-0x0000000140835000-memory.dmp

memory/3984-65-0x0000000140000000-0x0000000140835000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-05-15 07:53

Reported

2025-05-15 07:55

Platform

win11-20250502-en

Max time kernel

120s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe"

Signatures

Phorphiex family

phorphiex

Phorphiex payload

Description Indicator Process Target
N/A N/A N/A N/A

Phorphiex, Phorpiex

worm trojan loader phorphiex

Xmrig family

xmrig

xmrig

miner xmrig

XMRig Miner payload

miner
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Creates new service(s)

persistence execution

Stops running service(s)

defense_evasion execution

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\syscrondvr.exe" C:\Users\Admin\AppData\Local\Temp\503115612.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4420 set thread context of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 set thread context of 4212 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\503115612.exe N/A
File opened for modification C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\503115612.exe N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\503115612.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\syscrondvr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\478617031.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\8A1F.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeLockMemoryPrivilege N/A C:\Windows\system32\dwm.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2552 wrote to memory of 5708 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe C:\Users\Admin\AppData\Local\Temp\8A1F.exe
PID 2552 wrote to memory of 5708 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe C:\Users\Admin\AppData\Local\Temp\8A1F.exe
PID 2552 wrote to memory of 5708 N/A C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe C:\Users\Admin\AppData\Local\Temp\8A1F.exe
PID 5708 wrote to memory of 5084 N/A C:\Users\Admin\AppData\Local\Temp\8A1F.exe C:\Users\Admin\AppData\Local\Temp\503115612.exe
PID 5708 wrote to memory of 5084 N/A C:\Users\Admin\AppData\Local\Temp\8A1F.exe C:\Users\Admin\AppData\Local\Temp\503115612.exe
PID 5708 wrote to memory of 5084 N/A C:\Users\Admin\AppData\Local\Temp\8A1F.exe C:\Users\Admin\AppData\Local\Temp\503115612.exe
PID 5084 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\503115612.exe C:\Windows\syscrondvr.exe
PID 5084 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\503115612.exe C:\Windows\syscrondvr.exe
PID 5084 wrote to memory of 2560 N/A C:\Users\Admin\AppData\Local\Temp\503115612.exe C:\Windows\syscrondvr.exe
PID 2340 wrote to memory of 3520 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 2340 wrote to memory of 3520 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 2340 wrote to memory of 3520 N/A C:\Windows\system32\cmd.exe C:\Windows\syscrondvr.exe
PID 2560 wrote to memory of 4044 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\478617031.exe
PID 2560 wrote to memory of 4044 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\478617031.exe
PID 2560 wrote to memory of 4044 N/A C:\Windows\syscrondvr.exe C:\Users\Admin\AppData\Local\Temp\478617031.exe
PID 4044 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\478617031.exe C:\Users\Admin\AppData\Local\Temp\974716511.exe
PID 4044 wrote to memory of 4560 N/A C:\Users\Admin\AppData\Local\Temp\478617031.exe C:\Users\Admin\AppData\Local\Temp\974716511.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 5320 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\conhost.exe
PID 4420 wrote to memory of 4212 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4420 wrote to memory of 4212 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4420 wrote to memory of 4212 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4420 wrote to memory of 4212 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe
PID 4420 wrote to memory of 4212 N/A C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe C:\Windows\system32\dwm.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe

"C:\Users\Admin\AppData\Local\Temp\2025-05-15_e73c2277c583551bcd96d095ba7c7090_amadey_elex_rhadamanthys_smoke-loader.exe"

C:\Users\Admin\AppData\Local\Temp\8A1F.exe

"C:\Users\Admin\AppData\Local\Temp\8A1F.exe"

C:\Users\Admin\AppData\Local\Temp\503115612.exe

C:\Users\Admin\AppData\Local\Temp\503115612.exe

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Windows\syscrondvr.exe

C:\Users\Admin\AppData\Local\Temp\478617031.exe

C:\Users\Admin\AppData\Local\Temp\478617031.exe

C:\Users\Admin\AppData\Local\Temp\974716511.exe

C:\Users\Admin\AppData\Local\Temp\974716511.exe

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe delete "MgrSrvdrvcs"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe create "MgrSrvdrvcs" binpath= "C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe" start= "auto"

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe stop eventlog

C:\Windows\system32\sc.exe

C:\Windows\system32\sc.exe start "MgrSrvdrvcs"

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

C:\ProgramData\MgrSrvdrvcs\sysmtdrav.exe

C:\Windows\system32\conhost.exe

C:\Windows\system32\conhost.exe

C:\Windows\system32\dwm.exe

dwm.exe

Network

Country Destination Domain Proto
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
UA 185.156.72.39:80 185.156.72.39 tcp
NL 45.141.233.6:80 45.141.233.6 tcp
UA 185.156.72.39:5151 tcp
US 20.72.235.82:80 www.update.microsoft.com tcp
IR 217.77.124.74:40500 udp
EG 156.222.115.254:40500 tcp
YE 134.35.238.16:40500 udp
KZ 5.63.82.108:40500 udp
CN 219.159.184.14:40500 udp
AF 175.106.38.40:40500 udp
YE 78.137.66.141:40500 udp
CN 218.202.215.94:40500 tcp
DZ 41.101.164.168:40500 udp
KZ 178.91.80.207:40500 udp
N/A 172.16.16.140:40500 udp
TJ 77.244.144.31:40500 udp
AZ 94.20.231.43:40500 udp
KZ 178.91.80.207:40500 tcp
AO 129.122.132.126:40500 udp
MX 187.225.195.150:40500 udp
OM 109.200.160.61:40500 udp
MX 187.133.20.144:40500 udp
YE 178.130.66.39:40500 udp
IR 176.102.248.222:40500 tcp

Files

C:\Users\Admin\AppData\Local\Temp\8A1F.exe

MD5 0ec46393976eb51f307cc11d80bae845
SHA1 69d4cb168f3a1b97c37a0ba1519d0adb1ff7e245
SHA256 252171bdaa35d19f872c165e861b03d347a4afb85d7a03d02f8eae09d191038d
SHA512 803351760e3c422e4825103235e13085004b3418b483a2c646aafaef62b7212a1ba4ed28469134a236c5b6121e6a748ba958bbae2dbe4afe9f9f45704928d31f

C:\Users\Admin\AppData\Local\Temp\503115612.exe

MD5 f30fdbf3448f67cbc3566f31729cb7a6
SHA1 fbf005c38f4a1c2e86817a2cb70406fc241f2c90
SHA256 81783b558904becc5b86553faba9525070de5f43339766eb1c025bcfbfe1eef8
SHA512 b428df2c8f8b4a002c8d7e1bfd9926e5cf95ee998688a2c360b8551e80be5bfbfa17ef210bea35f247da4a5c8a940fb5dba49f4786da9a74e5d001b771c8e9a8

C:\Users\Admin\AppData\Local\Temp\478617031.exe

MD5 c08cfa523c9377d3ae24fdb373b3ae13
SHA1 5289219770ad28b0fa4f0bdd91817f76bd6be222
SHA256 326c70a965d4e642275c26cd913e268b1db89edd59b31a86ee600a7a9c664eb0
SHA512 c91acd580ac832d5fed363a9a2b98b724a255d82e4fdda6eca62133feb5e60dd79a8caca36597a52bfbfa907a44208c48b15142e2e6020db219d14e970c3f57c

C:\Users\Admin\AppData\Local\Temp\974716511.exe

MD5 0000638ebbfe0d620abe6ca32abb1b58
SHA1 ae908681544765eb238e92b4ff7df26884692aa0
SHA256 267ec6176c1111d9ffcf32fcfa6aa65917e64d1556dcbbd8989ee6bbebc2e72f
SHA512 1522ed6c96d0a6699aaf5c1e6e3956742f26e8b46f2c795c0b6cfd3c02421aa6101134ded49c6b97e4085a789056cfb2d0fa09630c1c8796c7fc8d49aef66212

memory/5320-36-0x0000000140000000-0x000000014000D000-memory.dmp

memory/5320-39-0x0000000140000000-0x000000014000D000-memory.dmp

memory/5320-35-0x0000000140000000-0x000000014000D000-memory.dmp

memory/5320-34-0x0000000140000000-0x000000014000D000-memory.dmp

memory/5320-37-0x0000000140000000-0x000000014000D000-memory.dmp

memory/5320-33-0x0000000140000000-0x000000014000D000-memory.dmp

memory/4212-43-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-44-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-48-0x00000206E5DA0000-0x00000206E5DC0000-memory.dmp

memory/4212-47-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-45-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-42-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-46-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-41-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-51-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-52-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-50-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-49-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-53-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-55-0x0000000140000000-0x0000000140835000-memory.dmp

memory/4212-56-0x0000000140000000-0x0000000140835000-memory.dmp