File name:

LoaderSMD.exe

Full analysis: https://app.any.run/tasks/e66a6497-31ef-479c-b7ce-5f7d13990385
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 13, 2024, 11:29:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
hiloti
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

795C786A383D69E5539BEFD58A905796

SHA1:

DB5969900E7BDEF414DFA7704F8FAA116181F9E2

SHA256:

28CD707FD18904C4BDCD7FD88D78BDF62F1CCEB8C098A0C2D99D45FC66C0FBDD

SSDEEP:

768:upYb4Xy/1SVsGgwdIwIS5gHeXzTAxO1wy3/r8Ha0jGBjZeeVVZ7/U8ri9x8SZGVB:uY1+Xq4vV3Pz9pV7Tdi9SS0HW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • HILOTI has been detected (SURICATA)

      • TokenSMD.exe (PID: 796)
  • SUSPICIOUS

    • Reads the Internet Settings

      • LoaderSMD.exe (PID: 2892)
      • WMIC.exe (PID: 2072)
      • WMIC.exe (PID: 2432)
      • WMIC.exe (PID: 1352)
      • TokenSMD.exe (PID: 796)
    • Reads security settings of Internet Explorer

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • Starts CMD.EXE for commands execution

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • Executable content was dropped or overwritten

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • Uses WMIC.EXE to obtain BIOS management information

      • cmd.exe (PID: 2152)
    • Uses WMIC.EXE to obtain CPU information

      • cmd.exe (PID: 1572)
    • Uses WMIC.EXE to obtain physical disk drive information

      • cmd.exe (PID: 2900)
    • Start notepad (likely ransomware note)

      • TokenSMD.exe (PID: 796)
  • INFO

    • Checks supported languages

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • Checks proxy server information

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • Reads the computer name

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • Reads the machine GUID from the registry

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • Creates files or folders in the user directory

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
    • Create files in a temporary directory

      • LoaderSMD.exe (PID: 2892)
      • TokenSMD.exe (PID: 796)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:27 16:34:52+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.27
CodeSize: 52224
InitializedDataSize: 19456
UninitializedDataSize: -
EntryPoint: 0xb26b
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
14
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start loadersmd.exe cmd.exe no specs #HILOTI tokensmd.exe cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs notepad.exe no specs loadersmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\SMD\lisence-smd.txtC:\Windows\System32\notepad.exeTokenSMD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
796"C:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.exe" C:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.exe
LoaderSMD.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\smd\tokensmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
880C:\Windows\system32\cmd.exe /c clsC:\Windows\System32\cmd.exeLoaderSMD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1340C:\Windows\system32\cmd.exe /c clsC:\Windows\System32\cmd.exeTokenSMD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1352wmic diskdrive get serialnumber C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1572C:\Windows\system32\cmd.exe /c wmic cpu get processorid >> C:\Users\admin\AppData\Local\Temp\sm4.1C:\Windows\System32\cmd.exeTokenSMD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1844C:\Windows\system32\cmd.exe /c color AC:\Windows\System32\cmd.exeTokenSMD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2072wmic bios get serialnumber C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2152C:\Windows\system32\cmd.exe /c wmic bios get serialnumber >> C:\Users\admin\AppData\Local\Temp\sm4.0C:\Windows\System32\cmd.exeTokenSMD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2432wmic cpu get processorid C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
Total events
7 212
Read events
7 152
Write events
47
Delete events
13

Modification events

(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2892) LoaderSMD.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
3
Suspicious files
1
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
2892LoaderSMD.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\InjekKey[1].mentah
MD5:
SHA256:
2892LoaderSMD.exeC:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.exeexecutable
MD5:
SHA256:
2892LoaderSMD.exeC:\Users\admin\AppData\Local\Temp\SMD\TokenSMD.mentah
MD5:
SHA256:
2152cmd.exeC:\Users\admin\AppData\Local\Temp\sm4.0text
MD5:
SHA256:
1572cmd.exeC:\Users\admin\AppData\Local\Temp\sm4.1text
MD5:
SHA256:
2900cmd.exeC:\Users\admin\AppData\Local\Temp\sm4.2text
MD5:
SHA256:
796TokenSMD.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\FileKey[1].mentah
MD5:
SHA256:
796TokenSMD.exeC:\Users\admin\AppData\Local\Temp\smd.mnthexecutable
MD5:
SHA256:
796TokenSMD.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\resp1[1].htmbinary
MD5:
SHA256:
796TokenSMD.exeC:\Users\admin\AppData\Local\Temp\SMD\lisence-smd.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
6
DNS requests
2
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2892
LoaderSMD.exe
GET
200
142.132.150.169:80
http://link-donglod.my.id/samarinda/InjekKey.mentah
unknown
unknown
796
TokenSMD.exe
GET
200
142.132.150.169:80
http://link-donglod.my.id/samarinda/resp1.php?e=58EC68DEEA78D0CA775A96491CA85B40&k=SMD
unknown
unknown
796
TokenSMD.exe
GET
200
142.132.150.169:80
http://link-donglod.my.id/samarinda/FileKey.mentah
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2892
LoaderSMD.exe
142.132.150.169:80
link-donglod.my.id
Hetzner Online GmbH
DE
unknown
796
TokenSMD.exe
142.132.150.169:80
link-donglod.my.id
Hetzner Online GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
link-donglod.my.id
  • 142.132.150.169
unknown

Threats

PID
Process
Class
Message
2892
LoaderSMD.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
796
TokenSMD.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
796
TokenSMD.exe
Potentially Bad Traffic
ET HUNTING Hiloti Style GET to PHP with invalid terse MSIE headers
Misc activity
ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging)
No debug info