File name:

2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader

Full analysis: https://app.any.run/tasks/232a21d0-ea83-4379-ad94-702f8f203b44
Verdict: Malicious activity
Analysis date: March 25, 2025, 02:40:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

F9D0CAAC75F72F52342485F5155763A4

SHA1:

00AFF38901E11457C92A400C0331D015CE18DFF3

SHA256:

E7A0FE153E98526DAA4203F720BF9D4548DB76BFFEBDCEFA42357D9CE011EDB2

SSDEEP:

98304:iefUuZuKAuf5jTFGkOefUuZuKAuf5jTFrkHVrGDYwOwjefUuZuKAuf5jTFPkOef+:d

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE for service management

      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 4448)
      • cmd.exe (PID: 5176)
      • net.exe (PID: 7420)
      • net.exe (PID: 7672)
      • cmd.exe (PID: 3676)
      • net.exe (PID: 7464)
      • net.exe (PID: 7416)
      • net.exe (PID: 7440)
      • cmd.exe (PID: 6148)
    • Uses NET.EXE to stop Windows Update service

      • cmd.exe (PID: 5988)
      • net.exe (PID: 7420)
    • Starts NET.EXE to view/change users localgroup

      • cmd.exe (PID: 496)
      • net.exe (PID: 7456)
    • Uses NET.EXE to stop Windows Security Center service

      • cmd.exe (PID: 3676)
      • net.exe (PID: 7464)
    • Starts NET.EXE to view/add/change user profiles

      • cmd.exe (PID: 2340)
      • net.exe (PID: 7492)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • UpdatAuto.exe (PID: 6040)
      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
    • Starts itself from another location

      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
    • Executing commands from a ".bat" file

      • UpdatAuto.exe (PID: 6040)
      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
    • Starts CMD.EXE for commands execution

      • UpdatAuto.exe (PID: 6040)
      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7264)
      • sc.exe (PID: 7256)
      • sc.exe (PID: 7272)
      • sc.exe (PID: 7280)
      • sc.exe (PID: 7304)
    • Starts a Microsoft application from unusual location

      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 3132)
    • Process drops legitimate windows executable

      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
      • UpdatAuto.exe (PID: 6040)
    • Executable content was dropped or overwritten

      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
      • UpdatAuto.exe (PID: 6040)
    • The process creates files with name similar to system file names

      • UpdatAuto.exe (PID: 6040)
  • INFO

    • Checks supported languages

      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
      • UpdatAuto.exe (PID: 6040)
      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader~4.exe (PID: 6388)
    • Create files in a temporary directory

      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
      • UpdatAuto.exe (PID: 6040)
    • The sample compiled with chinese language support

      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
      • UpdatAuto.exe (PID: 6040)
    • Reads the computer name

      • UpdatAuto.exe (PID: 6040)
    • Creates files in the program directory

      • UpdatAuto.exe (PID: 6040)
      • 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe (PID: 5960)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (47.8)
.exe | InstallShield setup (25.1)
.exe | Win32 Executable MS Visual C++ (generic) (18.2)
.dll | Win32 Dynamic Link Library (generic) (3.8)
.exe | Win32 Executable (generic) (2.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2007:03:12 04:30:52+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 102400
InitializedDataSize: 16384
UninitializedDataSize: -
EntryPoint: 0x27dc
OSVersion: 4
ImageVersion: 6.1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.1.0.0
ProductVersionNumber: 6.1.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Unicode
Comments: Windows Update Manager for NT
CompanyName: Microsoft Corporation
FileDescription: Windows Update Manager for NT
LegalCopyright: Copyright (C) Microsoft Corp. 1981-1999
ProductName: Microsoft(R) Windows (R) 2000 Operating System
FileVersion: 6.01
ProductVersion: 6.01
InternalName: INCUBUS
OriginalFileName: INCUBUS.exe
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
173
Monitored processes
48
Malicious processes
4
Suspicious processes
6

Behavior graph

Click at the process to see the details
start 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe cmd.exe no specs conhost.exe no specs updatauto.exe cmd.exe no specs conhost.exe no specs 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader~4.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs net.exe no specs net.exe no specs net.exe no specs net.exe no specs net.exe no specs net.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net1.exe no specs net.exe no specs net1.exe no specs slui.exe no specs 2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
496cmd.exe /c net localgroup administrators helpassistant /addC:\Windows\SysWOW64\cmd.exe2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
780\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1852\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2340cmd.exe /c net user helpassistant 123456C:\Windows\SysWOW64\cmd.exe2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
2656\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3020\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3132"C:\Users\admin\Desktop\2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe" C:\Users\admin\Desktop\2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Update Manager for NT
Exit code:
3221226540
Version:
6.01
Modules
Images
c:\users\admin\desktop\2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3300C:\WINDOWS\system32\cmd.exe /c C:\WINDOWS\system32\Option.batC:\Windows\SysWOW64\cmd.exeUpdatAuto.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
3676cmd.exe /c net stop wscsvcC:\Windows\SysWOW64\cmd.exe2025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
3888\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
710
Read events
710
Write events
0
Delete events
0

Modification events

No data
Executable files
20
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
59602025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exeC:\Windows\SysWOW64\Option.battext
MD5:1D04ABF39E9DF55EED1D04430CC21EB8
SHA256:0BC485263CF8A962E64DB0B88F156F2A9AF1B81ECFDB1CF9111D497E85DF70F3
59602025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exeC:\ntldr~6executable
MD5:0EB4AD2ACB46C2422F383078C2D245B1
SHA256:406E977B30AF6431249329AA6AF8509E84D4FE4AE35D86794E04FDFEF22A3843
6040UpdatAuto.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\CRLogTransport.exe
MD5:
SHA256:
6040UpdatAuto.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\CRWindowsClientService.exe
MD5:
SHA256:
59602025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\Eula.exe
MD5:
SHA256:
59602025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroTextExtractor.exeexecutable
MD5:5503EAC6017F193192E1A9D5506B32A5
SHA256:7BFE0E5E52A101559E254D6C7482F6D21A2C4871B25E71DD1B1E62C77C5F0DBF
6040UpdatAuto.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exeexecutable
MD5:DB08B0F658DE5B78B6250EE8FD6904CC
SHA256:A103C9DA1A0CE3216976E3FDB7DF88A431367DA09B9A15C2474C26523890FE1A
59602025-03-25_f9d0caac75f72f52342485f5155763a4_hijackloader_rhadamanthys_smoke-loader.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\ADelRCP.exeexecutable
MD5:8D23B41052F17F336A28F693689A2C6F
SHA256:5F92FA34CA1FDC3D68EB3C769F39AEEFDC21EFB1944AFA64750DD59BE262DFD6
6040UpdatAuto.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\ADelRCP.exeexecutable
MD5:289A77BD11F887AA9CA4600D41475F71
SHA256:73275F643BA55E61728F8E0732C97A000F35D32614A873D2AB782EB3F9691725
6040UpdatAuto.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroTextExtractor.exeexecutable
MD5:146C5739A8DBDF8B32442D569A4D9242
SHA256:84FE4213A6016EAA39DBDF39927F9F8E8574E06AAE67BA3F20C00F35F3A51C98
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
28
TCP/UDP connections
41
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
304
20.12.23.50:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
8020
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
8020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
GET
200
13.95.31.18:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
8020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
8020
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
8020
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
8020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8020
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
40.126.31.1:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6744
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
8020
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8020
SIHClient.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
8020
SIHClient.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
8020
SIHClient.exe
13.95.31.18:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.74.206
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.131
  • 20.190.159.130
  • 40.126.31.69
  • 20.190.159.129
  • 40.126.31.3
  • 20.190.159.2
  • 40.126.31.0
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info