| File name: | 2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee |
| Full analysis: | https://app.any.run/tasks/3447f527-54fb-4ec7-96d6-b698a96afc90 |
| Verdict: | Malicious activity |
| Analysis date: | June 13, 2025, 20:26:05 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections |
| MD5: | CCB17FA14E9DF230791AB4609A9DB09E |
| SHA1: | BF564AD83009728A79A81BD541F0468B77CC4B55 |
| SHA256: | A12F3C13B70A7EDBBEC54F994211248A2D7C3D1E7F6F2939F63D4E1E3FE59C1B |
| SSDEEP: | 98304:3Rzg767sYTVXo1R3t+0L9jJv/WQcbNdFZMjHfG/kRzg7gmsCQYEqZdOt+0z7:zFZMjHfD |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:02:02 10:03:50+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 143360 |
| InitializedDataSize: | 139264 |
| UninitializedDataSize: | 274432 |
| EntryPoint: | 0x65ed0 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 23.9.20.1611 |
| ProductVersionNumber: | 23.9.20.1611 |
| FileFlagsMask: | 0x0017 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | Unicode |
| FileVersion: | 23, 9, 20, 1611 |
| ProductVersion: | 23, 9, 20, 1611 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1944 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3656 | "C:\Users\admin\Desktop\2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe" | C:\Users\admin\Desktop\2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 23, 9, 20, 1611 Modules
| |||||||||||||||
| 4544 | "C:\Users\admin\Desktop\2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe" | C:\Users\admin\Desktop\2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe | 2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe | ||||||||||||
User: admin Integrity Level: HIGH Version: 23, 9, 20, 1611 Modules
| |||||||||||||||
| 5400 | C:\Windows\Syswow64\6a82e075 | C:\Windows\SysWOW64\6a82e075 | services.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Version: 23, 9, 20, 1611 Modules
| |||||||||||||||
| (PID) Process: | (4544) 2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (4544) 2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (4544) 2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5400 | 6a82e075 | C:\Windows\5c7330 | text | |
MD5:7225E33C11EA60072A9D7B28C2CB30DA | SHA256:C9505DB48FF558F4F689F3679DD87763DA2D2A7709E11863BE665081495002BA | |||
| 4544 | 2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe | C:\Windows\4dcb80 | text | |
MD5:7D311ADE0BC97EF50DDA6E616D1B3725 | SHA256:5DE2945EE485C0A3F109C8FAD1B6A01506C2BA957FD266C7B3D23C88DB8F6359 | |||
| 4544 | 2025-06-13_ccb17fa14e9df230791ab4609a9db09e_amadey_cryptolocker_elex_mafia_smoke-loader_stealc_tofsee.exe | C:\Windows\SysWOW64\6a82e075 | executable | |
MD5:8FEB502F09706BE3C712B561EF59CB0D | SHA256:BA31174C449C7137B5A70606C1051E9E68C8F2904B4C2C5043B57FC962C130D3 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | — | 223.6.6.6:443 | https://dns.alidns.com/resolve?name=down.nugong.asia&type=1 | unknown | — | — | — |
— | — | GET | — | 223.6.6.6:443 | https://dns.alidns.com/resolve?name=spi1.tyui54345.xyz&type=16 | unknown | — | — | — |
— | — | GET | — | 223.5.5.5:443 | https://dns.alidns.com/resolve?name=spi2.tyui54345.xyz&type=16 | unknown | — | — | — |
5400 | 6a82e075 | GET | — | 223.5.5.5:80 | http://dns.alidns.com/resolve?name=down.nugong.asia&type=1 | unknown | — | — | whitelisted |
— | — | GET | — | 223.6.6.6:443 | https://dns.alidns.com/resolve?name=spi3.tyui54345.xyz&type=16 | unknown | — | — | — |
5400 | 6a82e075 | GET | — | 223.5.5.5:80 | http://223.5.5.5/resolve?name=down.nugong.asia&type=1 | unknown | — | — | unknown |
5400 | 6a82e075 | GET | — | 223.5.5.5:80 | http://dns.alidns.com/resolve?name=spi1.tyui54345.xyz&type=16 | unknown | — | — | whitelisted |
5400 | 6a82e075 | GET | — | 223.5.5.5:80 | http://223.5.5.5/resolve?name=spi1.tyui54345.xyz&type=16 | unknown | — | — | unknown |
5400 | 6a82e075 | GET | — | 223.5.5.5:80 | http://dns.alidns.com/resolve?name=spi2.tyui54345.xyz&type=16 | unknown | — | — | whitelisted |
5400 | 6a82e075 | GET | — | 223.5.5.5:80 | http://223.5.5.5/resolve?name=spi2.tyui54345.xyz&type=16 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3732 | RUXIMICS.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6024 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5400 | 6a82e075 | 223.5.5.5:443 | dns.alidns.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | whitelisted |
5400 | 6a82e075 | 223.5.5.5:80 | dns.alidns.com | Hangzhou Alibaba Advertising Co.,Ltd. | CN | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
down.nugong.asia |
| unknown |
dns.alidns.com |
| whitelisted |
down.xy58.top |
| unknown |
31bd9b27a24e0be9.tyui54345.xyz |
| unknown |
yzzcommon.tyui54345.xyz |
| unknown |
31bd9b27a24e0be9.zxcv56745.xyz |
| unknown |
yzzcommon.zxcv56745.xyz |
| unknown |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |
5400 | 6a82e075 | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |
5400 | 6a82e075 | Misc activity | ET INFO Observed DNS Over HTTPS Domain (dns .alidns .com in TLS SNI) |