File name:

5eacfa3bd68b1116875173c7a9a02bb5.exe

Full analysis: https://app.any.run/tasks/98a1ac88-0257-42b8-9930-7115d6fe90c5
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 02, 2023, 16:47:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
loader
smoke
smokeloader
stealer
redline
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

5EACFA3BD68B1116875173C7A9A02BB5

SHA1:

442959E7A3E4EE866A0185833D27DEAE8E2D5AAD

SHA256:

F35DBAFF6F328DAA836DCAB2A80CF3EFAE4DD574788E153A7ECD27F52DA9DEE1

SSDEEP:

6144:VjYYt/gBYfH9zGfpoAJA2eElNjyiFSlNlwr4eNFKgizQrx3kyQBlVVVVV3jX:VjYY19ihbeGlfmBlVVVVVj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was injected by another process

      • explorer.exe (PID: 1944)
    • Runs injected code in another process

      • 5eacfa3bd68b1116875173c7a9a02bb5.exe (PID: 2560)
    • Connects to the CnC server

      • explorer.exe (PID: 1944)
    • SMOKE has been detected (SURICATA)

      • explorer.exe (PID: 1944)
    • REDLINE has been detected (SURICATA)

      • 8058.exe (PID: 3052)
    • Steals credentials from Web Browsers

      • 8058.exe (PID: 3052)
    • Actions looks like stealing of personal data

      • 8058.exe (PID: 3052)
  • SUSPICIOUS

    • Application launched itself

      • 5eacfa3bd68b1116875173c7a9a02bb5.exe (PID: 2208)
      • evhtujv (PID: 2176)
    • Searches for installed software

      • 8058.exe (PID: 3052)
    • Reads browser cookies

      • 8058.exe (PID: 3052)
    • Starts application with an unusual extension

      • evhtujv (PID: 2176)
    • The process executes via Task Scheduler

      • evhtujv (PID: 2176)
    • Connects to unusual port

      • 8058.exe (PID: 3052)
  • INFO

    • Reads settings of System Certificates

      • explorer.exe (PID: 1944)
    • Reads the computer name

      • 8058.exe (PID: 3052)
    • Checks supported languages

      • 8058.exe (PID: 3052)
      • 5eacfa3bd68b1116875173c7a9a02bb5.exe (PID: 2560)
      • evhtujv (PID: 2176)
      • evhtujv (PID: 640)
      • 5eacfa3bd68b1116875173c7a9a02bb5.exe (PID: 2208)
    • Creates files or folders in the user directory

      • explorer.exe (PID: 1944)
    • Create files in a temporary directory

      • explorer.exe (PID: 1944)
    • Reads the machine GUID from the registry

      • 8058.exe (PID: 3052)
    • Reads the Internet Settings

      • explorer.exe (PID: 1944)
    • Drops the executable file immediately after the start

      • explorer.exe (PID: 1944)
    • Reads Environment values

      • 8058.exe (PID: 3052)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (42.6)
.exe | Clipper DOS Executable (19.1)
.exe | Generic Win/DOS Executable (18.9)
.exe | DOS Executable Generic (18.9)
.vxd | VXD Driver (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:11:05 21:44:11+01:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 167936
InitializedDataSize: 40488448
UninitializedDataSize: -
EntryPoint: 0x3704
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 37.0.0.0
ProductVersionNumber: 46.0.0.0
FileFlagsMask: 0x145a
FileFlags: (none)
FileOS: Unknown (0x20723)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Unknown (0452)
CharacterSet: Unknown (30F3)
FileDescription: Mabling
LegalCopyright: Copyright (C) 2022, Crazy
OriginalFileName: Munpler
ProductsVersion: 19.3.71.61
ProductionVersion: 16.78.79.2
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
6
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start inject 5eacfa3bd68b1116875173c7a9a02bb5.exe no specs 5eacfa3bd68b1116875173c7a9a02bb5.exe no specs #SMOKE explorer.exe #REDLINE 8058.exe evhtujv no specs evhtujv no specs

Process information

PID
CMD
Path
Indicators
Parent process
640C:\Users\admin\AppData\Roaming\evhtujv C:\Users\admin\AppData\Roaming\evhtujvevhtujv
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\evhtujv
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
1944C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2176C:\Users\admin\AppData\Roaming\evhtujv C:\Users\admin\AppData\Roaming\evhtujvtaskeng.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\evhtujv
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2208"C:\Users\admin\AppData\Local\Temp\5eacfa3bd68b1116875173c7a9a02bb5.exe" C:\Users\admin\AppData\Local\Temp\5eacfa3bd68b1116875173c7a9a02bb5.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\5eacfa3bd68b1116875173c7a9a02bb5.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2560"C:\Users\admin\AppData\Local\Temp\5eacfa3bd68b1116875173c7a9a02bb5.exe" C:\Users\admin\AppData\Local\Temp\5eacfa3bd68b1116875173c7a9a02bb5.exe5eacfa3bd68b1116875173c7a9a02bb5.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\5eacfa3bd68b1116875173c7a9a02bb5.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
3052C:\Users\admin\AppData\Local\Temp\8058.exeC:\Users\admin\AppData\Local\Temp\8058.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\8058.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
3 678
Read events
3 669
Write events
9
Delete events
0

Modification events

(PID) Process:(1944) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
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
(PID) Process:(1944) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
2
Suspicious files
4
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1944explorer.exeC:\Users\admin\AppData\Local\Temp\Cab7E23.tmpcompressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
1944explorer.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
1944explorer.exeC:\Users\admin\AppData\Local\Temp\Tar7E24.tmpbinary
MD5:9C0C641C06238516F27941AA1166D427
SHA256:4276AF3669A141A59388BC56A87F6614D9A9BDDDF560636C264219A7EB11256F
1944explorer.exeC:\Users\admin\AppData\Local\Temp\8058.exeexecutable
MD5:E16CD09E45F4FFF436C91914AB16AB40
SHA256:E55AC698B397627B19616C85832350F56148295489A48B35F43C3C4F5616F2A2
1944explorer.exeC:\Users\admin\AppData\Roaming\evhtujvexecutable
MD5:5EACFA3BD68B1116875173C7A9A02BB5
SHA256:F35DBAFF6F328DAA836DCAB2A80CF3EFAE4DD574788E153A7ECD27F52DA9DEE1
1944explorer.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:98BB151F85C69A78C07F35B191FAFE32
SHA256:60D8E1AF527A9B54295A4712705C133941A6130386FB2E156293070EC86AA6F2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
12
DNS requests
4
Threats
20

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1944
explorer.exe
POST
404
212.193.56.210:80
http://host-host-file8.com/
unknown
html
407 b
unknown
1944
explorer.exe
POST
404
212.193.56.210:80
http://host-host-file8.com/
unknown
binary
96 b
unknown
1944
explorer.exe
POST
404
212.193.56.210:80
http://host-host-file8.com/
unknown
binary
56 b
unknown
1944
explorer.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?65d7095bd2032298
unknown
compressed
65.2 Kb
unknown
1944
explorer.exe
POST
404
212.193.56.210:80
http://host-host-file8.com/
unknown
html
407 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted
1944
explorer.exe
212.193.56.210:80
host-host-file8.com
Trader soft LLC
RU
unknown
1944
explorer.exe
144.76.136.153:443
transfer.sh
Hetzner Online GmbH
DE
unknown
1944
explorer.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
3052
8058.exe
20.96.123.147:4883
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
host-file-host6.com
unknown
host-host-file8.com
  • 212.193.56.210
malicious
transfer.sh
  • 144.76.136.153
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted

Threats

PID
Process
Class
Message
1944
explorer.exe
A Network Trojan was detected
ET MALWARE Suspected Smokeloader Activity (POST)
1944
explorer.exe
A Network Trojan was detected
LOADER [ANY.RUN] Smokeloader HTTP Header
1944
explorer.exe
A Network Trojan was detected
ET MALWARE Suspected Smokeloader Activity (POST)
1944
explorer.exe
A Network Trojan was detected
LOADER [ANY.RUN] Smokeloader HTTP Header
1944
explorer.exe
A Network Trojan was detected
ET MALWARE Suspected Smokeloader Activity (POST)
1944
explorer.exe
A Network Trojan was detected
LOADER [ANY.RUN] Smokeloader HTTP Header
324
svchost.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed (transfer .sh in DNS Lookup)
324
svchost.exe
Potentially Bad Traffic
ET POLICY Observed DNS Query to File Transfer Service Domain (transfer .sh)
1944
explorer.exe
Misc activity
ET INFO Commonly Abused File Sharing Site Domain Observed (transfer .sh in TLS SNI)
1944
explorer.exe
Potential Corporate Privacy Violation
ET POLICY Observed File Transfer Service SSL/TLS Certificate (transfer .sh)
3 ETPRO signatures available at the full report
No debug info