| File name: | 2025-03-24_44e50be992352341e96724b070f13a16_karagany_rhadamanthys_smoke-loader |
| Full analysis: | https://app.any.run/tasks/517f69a7-b3a7-4fb6-a9bf-76965e819d9c |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | March 24, 2025, 15:39:45 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | 44E50BE992352341E96724B070F13A16 |
| SHA1: | 8E818AA8CB6F3BB05950B96940E8FF6BE8A4F466 |
| SHA256: | 42E68BF8D713E8C1F3248974A4A7FF66888A71986D9DF655C582B074182C69D2 |
| SSDEEP: | 3072:AOn8/BFhEQ0/VIXnJ2TuQbWNKs9N0YHVVVViVCV+S:WBFhEQYaRlNKYNVVVVViVCV5 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2018:10:15 22:13:03+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 29184 |
| InitializedDataSize: | 83456 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x76e0 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 28.0.0.0 |
| ProductVersionNumber: | 28.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | Debug |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 904 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5492 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7548 | "C:\Users\admin\Desktop\2025-03-24_44e50be992352341e96724b070f13a16_karagany_rhadamanthys_smoke-loader.exe" | C:\Users\admin\Desktop\2025-03-24_44e50be992352341e96724b070f13a16_karagany_rhadamanthys_smoke-loader.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221225477 Modules
| |||||||||||||||
| 7700 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7548 -s 448 | C:\Windows\SysWOW64\WerFault.exe | — | 2025-03-24_44e50be992352341e96724b070f13a16_karagany_rhadamanthys_smoke-loader.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7700 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2025-03-24_44e50_98ca67202ea04e36707d8cc22a1e2e5718b63d6_01ddf9be_da37816a-a279-4c28-94e5-bc9cc3bd4bf2\Report.wer | — | |
MD5:— | SHA256:— | |||
| 7700 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\2025-03-24_44e50be992352341e96724b070f13a16_karagany_rhadamanthys_smoke-loader.exe.7548.dmp | binary | |
MD5:B600F0CBFC6EA8E13E7DBCD5BD676E6D | SHA256:EF415FF9038575C12FB0D502ED17182EFBBF44537DB99D07E9942587B3A02B6B | |||
| 7700 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER1886.tmp.dmp | binary | |
MD5:027EEC9D0BDB9D352FB2744C4541DCC4 | SHA256:6F63F3CA28BB79681074C6747409A15D5044AB573AACE182FBF7EC0C8C8DCD2C | |||
| 7700 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER1C41.tmp.xml | xml | |
MD5:F64995292E8A245D4C24FF180D5290D9 | SHA256:053D40DF75037E31A4B79007E673113188783B0C2D27A37BE6D09CDB531C8DBF | |||
| 7548 | 2025-03-24_44e50be992352341e96724b070f13a16_karagany_rhadamanthys_smoke-loader.exe | C:\Users\admin\AppData\Local\Temp\CC4F.tmp | executable | |
MD5:9829BD4BC72E924BB60D9DC4EAA7B853 | SHA256:F8926DA814046711E9BF5206E8F972E2ED21430E7778AFA36C06542420736E5D | |||
| 7700 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER1B75.tmp.WERInternalMetadata.xml | binary | |
MD5:B96DD87E84A1CE577F9A9B9A2020D08D | SHA256:6193081A2F9B879EBF7841D1BC2CE626846910EDEBF628BFC71487074B2E77A5 | |||
| 5492 | explorer.exe | C:\Users\admin\AppData\Roaming\resrfre | xml | |
MD5:1DEE138C17793EF1443773EE5AF3CDEF | SHA256:418CBD95A746CF73FDCB530A9E8092D5A87483700D496B84CE63CB6E529267AD | |||
| 5492 | explorer.exe | C:\Users\admin\AppData\Roaming\bjcgshj | executable | |
MD5:44E50BE992352341E96724B070F13A16 | SHA256:42E68BF8D713E8C1F3248974A4A7FF66888A71986D9DF655C582B074182C69D2 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 304 | 52.149.20.212:443 | https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL | unknown | — | — | — |
8008 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
8008 | SIHClient.exe | GET | 200 | 23.48.23.183:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | POST | 400 | 20.190.159.71:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 200 | 40.126.31.2:443 | https://login.live.com/RST2.srf | unknown | xml | 1.35 Kb | whitelisted |
— | — | GET | 200 | 20.103.156.88:443 | https://arc.msn.com/v3/Delivery/Placement?pubid=da63df93-3dbc-42ae-a505-b34988683ac7&pid=280815&adm=2&w=1&h=1&wpx=1&hpx=1&fmt=json&cltp=app&dim=le&rafb=0&nct=1&pm=1&cfmt=text,image,poly&sft=jpeg,png,gif&topt=1&poptin=0&localid=w:AC7699B0-48EA-FD22-C8DC-06A02098A0F0&ctry=US&time=20250324T153954Z&lc=en-US&pl=en-US&idtp=mid&uid=9115d6d1-9f4e-4053-9297-2a8c833b3912&aid=00000000-0000-0000-0000-000000000000&ua=WindowsShellClient%2F9.0.40929.0%20%28Windows%29&asid=76a343451a064b5eaf3669c7525e3506&ctmode=MultiSession&arch=x64&betaedgever=0.0.0.0&canedgever=0.0.0.0&cdm=1&cdmver=10.0.19041.3636&currsel=137271744000000000&devedgever=0.0.0.0&devfam=Windows.Desktop&devform=Unknown&devosver=10.0.19045.4046&disphorzres=1280&dispsize=15.3&dispvertres=720&fosver=16299&isu=0&lo=3967659&metered=false&nettype=ethernet&npid=sc-280815&oemName=DELL&oemid=DELL&ossku=Professional&prevosver=15063&smBiosDm=DELL&stabedgever=122.0.2365.59&tl=2&tsu=1358189&waasBldFlt=1&waasCfgExp=1&waasCfgSet=1&waasRetail=1&waasRing=&svoffered=2 | unknown | binary | 2.95 Kb | whitelisted |
— | — | POST | 400 | 20.190.159.2:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
8008 | SIHClient.exe | GET | 200 | 23.48.23.183:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
8008 | SIHClient.exe | GET | 200 | 23.48.23.183:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
8008 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 20.198.162.78:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | SG | whitelisted |
— | — | 40.126.31.71:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 40.126.31.71:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4892 | backgroundTaskHost.exe | 20.103.156.88:443 | arc.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3216 | svchost.exe | 20.198.162.78:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | SG | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
8008 | SIHClient.exe | 52.149.20.212:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
google.com |
| whitelisted |
arc.msn.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
vgerkisv.com |
| unknown |