File name:

2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader

Full analysis: https://app.any.run/tasks/ec75302a-b861-4249-8273-6db5592683fd
Verdict: Malicious activity
Analysis date: April 29, 2025, 01:44:00
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
tofsee
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

B7A1887B527A1A3264CB840D036F0246

SHA1:

5DA08B22D9BDFBF75A16ABF7DA3DA4ECC4529018

SHA256:

29DA321820357352DDE6C6BA2F01075F93558F5600109285BB047CF3AB658112

SSDEEP:

98304:e+HCI5555555555555555555555555555555555555555555555555555555555H:r

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
    • TOFSEE has been detected (YARA)

      • svchost.exe (PID: 4268)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
    • Reads security settings of Internet Explorer

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
    • Executes application which crashes

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
      • mggxirik.exe (PID: 1676)
      • mggxirik.exe (PID: 1116)
    • Detected use of alternative data streams (AltDS)

      • svchost.exe (PID: 6808)
      • svchost.exe (PID: 4268)
    • Connects to SMTP port

      • svchost.exe (PID: 6808)
      • svchost.exe (PID: 4268)
  • INFO

    • The sample compiled with chinese language support

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
    • Create files in a temporary directory

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
    • Process checks computer location settings

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
    • Checks supported languages

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
      • mggxirik.exe (PID: 1676)
      • mggxirik.exe (PID: 1116)
    • Reads the computer name

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
      • mggxirik.exe (PID: 1676)
      • mggxirik.exe (PID: 1116)
    • Auto-launch of the file from Registry key

      • 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe (PID: 1164)
    • Manual execution by a user

      • mggxirik.exe (PID: 1116)
    • Checks proxy server information

      • slui.exe (PID: 2040)
    • Reads the software policy settings

      • slui.exe (PID: 2040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Clipper DOS Executable (2.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:07:02 13:00:57+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 124416
InitializedDataSize: 4479488
UninitializedDataSize: -
EntryPoint: 0x1294a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.2.5.1
ProductVersionNumber: 1.9.0.1
FileFlagsMask: 0x006f
FileFlags: Private build
FileOS: Unknown (0x40314)
ObjectFileType: Static library
FileSubtype: 49
LanguageCode: Chinese (Simplified)
CharacterSet: Unknown (05B0)
InternalName: avezejzaz.im
LegalCopyright: Copyright (C) 2020, cayle
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
11
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe wusa.exe no specs wusa.exe mggxirik.exe werfault.exe no specs svchost.exe werfault.exe no specs mggxirik.exe #TOFSEE svchost.exe werfault.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
896C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1116 -s 524C:\Windows\SysWOW64\WerFault.exemggxirik.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
976C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1164 -s 756C:\Windows\SysWOW64\WerFault.exe2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1116"C:\Users\admin\mggxirik.exe"C:\Users\admin\mggxirik.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\mggxirik.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\rpcrt4.dll
1164"C:\Users\admin\Desktop\2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe" C:\Users\admin\Desktop\2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
1348C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1676 -s 560C:\Windows\SysWOW64\WerFault.exemggxirik.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1676"C:\Users\admin\mggxirik.exe" /d"C:\Users\admin\Desktop\2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe" /e550302100000007FC:\Users\admin\mggxirik.exe
2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\mggxirik.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
2040C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4268svchost.exeC:\Windows\SysWOW64\svchost.exe
mggxirik.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\rpcrt4.dll
5528"C:\WINDOWS\SysWOW64\wusa.exe" C:\Windows\SysWOW64\wusa.exe
2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Update Standalone Installer
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wusa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5892"C:\Windows\System32\wusa.exe" C:\Windows\SysWOW64\wusa.exe2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Standalone Installer
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wusa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
5 319
Read events
5 316
Write events
2
Delete events
1

Modification events

(PID) Process:(1164) 2025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:abkjzldu
Value:
"C:\Users\admin\mggxirik.exe"
(PID) Process:(6808) svchost.exeKey:HKEY_CURRENT_USER\Control Panel\Buses
Operation:writeName:Config0
Value:
008DFE3D69C21E3D24EDB47D450DD49D084297DCE82E72BAA490B3FDE422031D1DDACF8648CD945D24EDB47D470DD49D024195DAF71261ADC06D04FDA6E22673BBC9154961CDA56B15D4824B743BE1AE644490BDB57B25E5945504CEFC8D3C74BBC4103D29FCA76813DB8C4F7C38E69D084295D9E13F4BB4C06D07FD
(PID) Process:(6808) svchost.exeKey:HKEY_CURRENT_USER\Control Panel\Buses
Operation:delete valueName:Config1
Value:
Executable files
2
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
11642025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exeC:\Users\admin\AppData\Local\Temp\ojnfvgig.exeexecutable
MD5:7C76C5EEF45513903F9D056F8B8FEA06
SHA256:A673C1323AB71DBA962910653C9B06D1371EE85F8AB79B7516749BCF97C36587
11642025-04-29_b7a1887b527a1a3264cb840d036f0246_amadey_elex_redline-stealer_rhadamanthys_smoke-loader.exeC:\Users\admin\mggxirik.exeexecutable
MD5:9ACB223B079186DCC552AFA00CF949A2
SHA256:7FFA9570EF9100726BAE388ED429462B8EB2AF85D02E0A2A796BFB1E714D29D7
6808svchost.exeC:\Users\admin:.reposbinary
MD5:9C2D9B0D47D2507F6283846B90E04113
SHA256:AAE27D79E9B25878FB8E4B3CC31D22583D91F975B34A92855B12DC3BC9103B35
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
32
TCP/UDP connections
57
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
4688
SIHClient.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
4688
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4688
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
4688
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
GET
200
4.245.163.56:443
https://slscr.update.microsoft.com/sls/ping
unknown
POST
400
40.126.31.129:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.31.128:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2104
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2104
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
6808
svchost.exe
13.107.246.59:80
microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6808
svchost.exe
52.101.42.18:25
microsoft-com.mail.protection.outlook.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.174
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
microsoft.com
  • 13.107.246.59
whitelisted
microsoft-com.mail.protection.outlook.com
  • 52.101.42.18
  • 52.101.9.12
  • 52.101.11.3
  • 52.101.10.14
whitelisted
login.live.com
  • 20.190.160.4
  • 40.126.32.140
  • 20.190.160.64
  • 20.190.160.14
  • 40.126.32.138
  • 20.190.160.2
  • 40.126.32.76
  • 40.126.32.72
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info