File name:

2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader

Full analysis: https://app.any.run/tasks/66707eea-b76b-48d9-921c-29494f605e8c
Verdict: Malicious activity
Analysis date: May 16, 2025, 09:46:39
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
urelas
bootkit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

27D0C2A79CE2377417C7A049BDDEC0BA

SHA1:

7A3EDBDF5F4CB74174EB2328395C7A4DC1CC9295

SHA256:

A74B9A24D3CDCE7F009710C947375E686E55353463188F242B5896C4C8828AEA

SSDEEP:

24576:voBWOVrnRzbHWzzWuUs+05n9yx3bfMup5N2lk/hXjZl2dP3BH3Dynhgn1ZN:voBWOVjRzbHWzzWuUs+05n9yx3bfzp5U

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • URELAS has been detected

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
      • qukoi.exe (PID: 7624)
      • pogigi.exe (PID: 7748)
    • Connects to the CnC server

      • pogigi.exe (PID: 7748)
    • URELAS mutex has been found

      • pogigi.exe (PID: 7748)
    • URELAS has been detected (YARA)

      • pogigi.exe (PID: 7748)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
      • qukoi.exe (PID: 7624)
    • Reads security settings of Internet Explorer

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
      • qukoi.exe (PID: 7624)
    • Starts itself from another location

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
      • qukoi.exe (PID: 7624)
    • Starts CMD.EXE for commands execution

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
    • Executing commands from a ".bat" file

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
    • Contacting a server suspected of hosting an CnC

      • pogigi.exe (PID: 7748)
    • Connects to unusual port

      • pogigi.exe (PID: 7748)
  • INFO

    • Reads the computer name

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
      • qukoi.exe (PID: 7624)
      • pogigi.exe (PID: 7748)
    • Checks supported languages

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
      • qukoi.exe (PID: 7624)
      • pogigi.exe (PID: 7748)
    • Create files in a temporary directory

      • qukoi.exe (PID: 7624)
      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
    • Process checks computer location settings

      • 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe (PID: 7568)
      • qukoi.exe (PID: 7624)
    • Checks proxy server information

      • slui.exe (PID: 1852)
    • Reads the software policy settings

      • slui.exe (PID: 1852)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:07:23 13:34:24+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 114688
InitializedDataSize: 585728
UninitializedDataSize: -
EntryPoint: 0x3219
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
6
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #URELAS 2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe #URELAS qukoi.exe cmd.exe no specs conhost.exe no specs #URELAS pogigi.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1852C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7568"C:\Users\admin\Desktop\2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe" C:\Users\admin\Desktop\2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7624"C:\Users\admin\AppData\Local\Temp\qukoi.exe" C:\Users\admin\AppData\Local\Temp\qukoi.exe
2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\qukoi.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7652C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\_vslite.bat" "C:\Windows\SysWOW64\cmd.exe2025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7664\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7748"C:\Users\admin\AppData\Local\Temp\pogigi.exe" OKC:\Users\admin\AppData\Local\Temp\pogigi.exe
qukoi.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\pogigi.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
4 233
Read events
4 233
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7624qukoi.exeC:\Users\admin\AppData\Local\Temp\pogigi.exeexecutable
MD5:F3598B6635F583D5BBDDBE6E225F47C3
SHA256:8CAF10CE8AC429E92E6A037348A80DC1BD68474D090507B9F451B0804AAFC1D2
75682025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exeC:\Users\admin\AppData\Local\Temp\golfinfo.initext
MD5:5B6114A5EA91138B88E80049995123BF
SHA256:A99C8DBB7DD2E13DF6743D9520ABDDCFA084B3DBF10AFA37AB3D8945E68083A8
75682025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exeC:\Users\admin\AppData\Local\Temp\_vslite.battext
MD5:BC7CABEBC5F30DB206D617A15D7A1FF6
SHA256:981E2E42FE6905A2967268A6363B7F995697260AE0DE643FEF902115AF35586A
75682025-05-16_27d0c2a79ce2377417c7a049bddec0ba_amadey_elex_gcleaner_rhadamanthys_smoke-loader.exeC:\Users\admin\AppData\Local\Temp\qukoi.exeexecutable
MD5:F3598B6635F583D5BBDDBE6E225F47C3
SHA256:8CAF10CE8AC429E92E6A037348A80DC1BD68474D090507B9F451B0804AAFC1D2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
55
DNS requests
17
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.216.77.18:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2104
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
7748
pogigi.exe
218.54.31.226:11110
SK Broadband Co Ltd
KR
malicious
6544
svchost.exe
40.126.31.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
  • 23.216.77.18
  • 23.216.77.12
  • 23.216.77.13
  • 23.216.77.5
  • 23.216.77.8
  • 23.216.77.6
  • 23.216.77.15
  • 23.216.77.17
  • 23.216.77.16
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
login.live.com
  • 40.126.31.128
  • 40.126.31.130
  • 20.190.159.2
  • 20.190.159.73
  • 20.190.159.130
  • 20.190.159.0
  • 20.190.159.4
  • 20.190.159.23
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
  • 20.73.194.208
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.21
whitelisted

Threats

PID
Process
Class
Message
7748
pogigi.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Bootkor Rootkit CnC Communication
7748
pogigi.exe
Malware Command and Control Activity Detected
MALWARE [ANY.RUN] Bootkor Rootkit CnC Communication
No debug info