| File name: | 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader |
| Full analysis: | https://app.any.run/tasks/695cba24-f50f-431a-be82-053b9344e7c0 |
| Verdict: | Malicious activity |
| Threats: | Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions. |
| Analysis date: | April 29, 2025, 08:48:50 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections |
| MD5: | 2B69933EE9EE71212E74E05D4A4341E9 |
| SHA1: | DE3704B8419DEAED5D446DDB5BBA25134EC6AD18 |
| SHA256: | 65C288255CB3383C276E17B145B90498CCF2D0D6664663D7B59D27975C02BEB0 |
| SSDEEP: | 98304:AMY3hdsTkfzU0tZh9Utuvjs5oUlmriMxxmTx2M5l:kq |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:05:23 06:44:09+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 41472 |
| InitializedDataSize: | 2419200 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x24f7 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 5.63.923.0 |
| ProductVersionNumber: | 5.63.923.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | Unicode |
| CompanyName: | 暴风集团股份有限公司 |
| FileDescription: | 暴风影音5(安装组件) |
| FileVersion: | 5.63.0923.0 |
| InternalName: | Uninst.exe |
| LegalCopyright: | Copyright (C) 2007-2016 暴风集团股份有限公司 |
| OriginalFileName: | Uninst.exe |
| ProductName: | 暴风影音5 |
| ProductVersion: | 5.63.0923.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 664 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1764 | "C:\Users\admin\Desktop\2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe" | C:\Users\admin\Desktop\2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | — | explorer.exe | |||||||||||
User: admin Company: 暴风集团股份有限公司 Integrity Level: MEDIUM Description: 暴风影音5(安装组件) Exit code: 3221226540 Version: 5.63.0923.0 Modules
| |||||||||||||||
| 3888 | "C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca | C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Shell Experience Host Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4488 | "C:\Users\admin\Desktop\2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe" | C:\Users\admin\Desktop\2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | explorer.exe | ||||||||||||
User: admin Company: 暴风集团股份有限公司 Integrity Level: HIGH Description: 暴风影音5(安装组件) Exit code: 0 Version: 5.63.0923.0 Modules
| |||||||||||||||
| 6988 | "C:\Users\admin\AppData\Local\Temp\B5_Uninst.exe" | C:\Users\admin\AppData\Local\Temp\B5_Uninst.exe | 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | ||||||||||||
User: admin Company: 暴风集团股份有限公司 Integrity Level: HIGH Description: 暴风影音卸载程序 Exit code: 0 Version: 5.63.0923.0 Modules
| |||||||||||||||
| (PID) Process: | (3888) ShellExperienceHost.exe | Key: | \REGISTRY\A\{44f0e7b7-b511-92e2-9ade-874c699aef65}\LocalState |
| Operation: | write | Name: | PeekBadges |
Value: 5B005D0000002307348DE3B8DB01 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | AntiVirusOverride |
Value: 1 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | AntiVirusDisableNotify |
Value: 1 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | FirewallDisableNotify |
Value: 1 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | FirewallOverride |
Value: 1 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | UpdatesDisableNotify |
Value: 1 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center |
| Operation: | write | Name: | UacDisableNotify |
Value: 1 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | GlobalUserOffline |
Value: 0 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | EnableLUA |
Value: 0 | |||
| (PID) Process: | (4488) 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile |
| Operation: | write | Name: | EnableFirewall |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4488 | 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | C:\Windows\system.ini | binary | |
MD5:101046132F506BA86A1044096408F49A | SHA256:D2289227763FC5C4EFE0A6D153E0DA2026F6CAAF9F6FD9E45F1698CF51DF713F | |||
| 4488 | 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | C:\Users\admin\AppData\Local\Temp\B5_Uninst.exe | executable | |
MD5:41709943FA9C8BEC2A17D58622E85686 | SHA256:F9BCB69C39D4B8D231E0B87BB4D880C57D2F7941E39D25F821E6F7C51DA24114 | |||
| 4488 | 2025-04-29_2b69933ee9ee71212e74e05d4a4341e9_amadey_elex_remcos_rhadamanthys_smoke-loader.exe | C:\Users\admin\AppData\Local\Temp\sophk.exe | executable | |
MD5:B360FA63134A63F9ACFE046D2DFE10D9 | SHA256:03E0C6C4CA8A24F961477887763397045E67862E059F7494014AEFC21891D40E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6988 | B5_Uninst.exe | GET | 200 | 118.193.104.145:80 | http://pub.funshion.com/interface/deliver?ve=&cl=web_baofeng&uc=111&cp=fr4k0se&fudid=&os=10.0.19045&deliver_ver=v1&client=web_baofeng&ap=bfkbu | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.216.77.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6988 | B5_Uninst.exe | 118.193.104.145:80 | pub.funshion.com | IDC, China Telecommunications Corporation | CN | whitelisted |
2104 | svchost.exe | 23.216.77.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6248 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
664 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
pub.funshion.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |