| File name: | 9587bda655a2dc730e4bdbd7de5ab39bc37de697fe22f449a6b2f851adaedfb8 |
| Full analysis: | https://app.any.run/tasks/a19fdba6-8dc6-4140-8308-0c11203fac94 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | June 02, 2025, 23:42:18 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | ACA54A0DDB87930DC31FE9123C46D76D |
| SHA1: | EA2B2453CDFF42D802117AB302028C9614A83A43 |
| SHA256: | 9587BDA655A2DC730E4BDBD7DE5AB39BC37DE697FE22F449A6B2F851ADAEDFB8 |
| SSDEEP: | 98304:n4WObp7a0kAf7hOUP5ll2Ei78jUpYCceVP0qndG47e/UHtwxXGSML/ULZoCOoMUR:NDulvmvgvnHj9YpuYf8GLgB4cmNYU |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (63.1) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (23.8) |
| .dll | | | Win32 Dynamic Link Library (generic) (5.6) |
| .exe | | | Win32 Executable (generic) (3.8) |
| .exe | | | Generic Win/DOS Executable (1.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:01:23 20:26:34+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 11 |
| CodeSize: | 9699840 |
| InitializedDataSize: | 2048 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x94210e |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 1.0.0.0 |
| InternalName: | latestrocki.exe |
| LegalCopyright: | |
| OriginalFileName: | latestrocki.exe |
| ProductVersion: | 1.0.0.0 |
| AssemblyVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 32 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powercfg.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 132 | "C:\Users\admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe" | C:\Users\admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | 31839b57a4f11171d6abc8bbc4451ee4.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 240 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 404 | C:\WINDOWS\system32\sc.exe delete "WSNKISKT" | C:\Windows\System32\sc.exe | — | FirstZ.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Service Control Manager Configuration Tool Exit code: 1060 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 472 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 656 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 668 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5364 -s 468 | C:\Windows\SysWOW64\WerFault.exe | — | csrss.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 780 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7940 -s 392 | C:\Windows\SysWOW64\WerFault.exe | — | 31839b57a4f11171d6abc8bbc4451ee4.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 928 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | sc.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1132 | C:\WINDOWS\system32\sc.exe stop wuauserv | C:\Windows\System32\sc.exe | — | FirstZ.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Service Control Manager Configuration Tool Exit code: 1062 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4784) BroomSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Broom |
| Operation: | write | Name: | Key |
Value: XZWEN-27MCX-Z9JD1-USCSW | |||
| (PID) Process: | (4784) BroomSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Broom |
| Operation: | write | Name: | Date |
Value: 047F6F9C5F5EE640 | |||
| (PID) Process: | (5228) 31839b57a4f11171d6abc8bbc4451ee4.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96 |
| Operation: | write | Name: | Servers |
Value: https://thestatsfiles.ru | |||
| (PID) Process: | (5228) 31839b57a4f11171d6abc8bbc4451ee4.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96 |
| Operation: | write | Name: | UUID |
Value: | |||
| (PID) Process: | (5228) 31839b57a4f11171d6abc8bbc4451ee4.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96 |
| Operation: | write | Name: | FirstInstallDate |
Value: E8363E6800000000 | |||
| (PID) Process: | (5228) 31839b57a4f11171d6abc8bbc4451ee4.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96 |
| Operation: | write | Name: | ServiceVersion |
Value: | |||
| (PID) Process: | (5228) 31839b57a4f11171d6abc8bbc4451ee4.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96 |
| Operation: | write | Name: | PGDSE |
Value: 0000000000000000 | |||
| (PID) Process: | (5228) 31839b57a4f11171d6abc8bbc4451ee4.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96 |
| Operation: | write | Name: | ServersVersion |
Value: C300000000000000 | |||
| (PID) Process: | (5492) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:0000000000060342 |
| Operation: | write | Name: | VirtualDesktop |
Value: 1000000030304456BFA0DB55E4278845B426357D5B5F97B3 | |||
| (PID) Process: | (5228) 31839b57a4f11171d6abc8bbc4451ee4.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\fde20f96 |
| Operation: | write | Name: | AV |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6072 | 9587bda655a2dc730e4bdbd7de5ab39bc37de697fe22f449a6b2f851adaedfb8.exe | C:\Users\admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe | executable | |
MD5:8DCC157B2C7D02AFDCD96896E3EA4902 | SHA256:079F86DC403A10360B70A9CD26620A7E924494988EB20CF301ED5BA9ECC9B459 | |||
| 4120 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ueydoesc.j52.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5304 | InstallSetup7.exe | C:\Users\admin\AppData\Local\Temp\BroomSetup.exe | executable | |
MD5:5E94F0F6265F9E8B2F706F1D46BBD39E | SHA256:50A46B3120DA828502EF0CABA15DEFBAD004A3ADB88E6EACF1F9604572E2D503 | |||
| 6072 | 9587bda655a2dc730e4bdbd7de5ab39bc37de697fe22f449a6b2f851adaedfb8.exe | C:\Users\admin\AppData\Local\Temp\InstallSetup7.exe | executable | |
MD5:6E23201D2E4560010928ADA16D5E4AE9 | SHA256:2E3D25B6B55A04346FCC1FA8F587DD08F27F2CF8878AD354A695E50C74956EFC | |||
| 4120 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_laxaxr3f.b1p.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 2136 | powershell.exe | C:\Windows\Temp\__PSScriptPolicyTest_52x4rr2n.dvi.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4120 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:EE3D27F81459B098C3E82B0EECA6B895 | SHA256:B8DF12A45988FCF401FEEF450A4A054DA6B12FA6C23B1078FDE1C029D2FD10FC | |||
| 5744 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive | binary | |
MD5:4AA94459561C7A66D1D9EECC8DB78E88 | SHA256:C5374794677312C539F55028CD1B37D5B6DEAEF6FB9301A1029EA2003583D8B9 | |||
| 5744 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_z433oome.3ci.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 2136 | powershell.exe | C:\Windows\Temp\__PSScriptPolicyTest_f4yoa3pm.z3t.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.42:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5492 | explorer.exe | POST | 404 | 188.40.141.211:80 | http://trad-einmyus.com/index.php | unknown | — | — | malicious |
5492 | explorer.exe | POST | 404 | 188.40.141.211:80 | http://trad-einmyus.com/index.php | unknown | — | — | malicious |
3768 | SIHClient.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
3768 | SIHClient.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
8064 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.216.77.42:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5304 | InstallSetup7.exe | 185.172.128.90:80 | — | OOO Nadym Svyaz Service | RU | malicious |
6544 | svchost.exe | 40.126.31.129:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
i.alie3ksgaa.com |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
trad-einmyus.com |
| malicious |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5492 | explorer.exe | A Network Trojan was detected | LOADER [ANY.RUN] Smokeloader HTTP Header |
5492 | explorer.exe | A Network Trojan was detected | LOADER [ANY.RUN] Smokeloader HTTP Header |
2196 | svchost.exe | Misc activity | ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) |
5364 | csrss.exe | Misc activity | ET INFO Observed Discord Domain (discordapp .com in TLS SNI) |
2196 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to Coin Mining Domain (nanopool .org) |
2196 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Online Pastebin Text Storage |
2196 | svchost.exe | Potential Corporate Privacy Violation | ET INFO Observed DNS Query to Coin Mining Domain (nanopool .org) |