File name:

2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader

Full analysis: https://app.any.run/tasks/8e2db4ea-15df-4700-98a0-ca84189366f8
Verdict: Malicious activity
Threats:

A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices.

Analysis date: March 24, 2025, 15:49:43
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
floxif
backdoor
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

AD155489D0EF2AC209792E191032516D

SHA1:

CE3FD5AFF5285259D23E980AD0AF0D1694608058

SHA256:

FE3DDF81ABD6423E3B1F83CD7417583AB76641F5CAF95700C6F7475ADF7E499B

SSDEEP:

98304:hbkPPn1AOkGBGQXKMfe6rykL2WarMCcX0x/5OxqXIL/q0e3pO9BP+XuM5z:3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
    • FLOXIF mutex has been found

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
    • Process drops legitimate windows executable

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
  • INFO

    • The sample compiled with english language support

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
    • Create files in a temporary directory

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
    • Failed to create an executable file in Windows directory

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
    • Reads the computer name

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
    • Checks supported languages

      • 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe (PID: 1052)
    • Checks proxy server information

      • slui.exe (PID: 5556)
    • Reads the software policy settings

      • slui.exe (PID: 5556)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:01:12 17:14:20+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 2634752
InitializedDataSize: 1180672
UninitializedDataSize: -
EntryPoint: 0x235412
OSVersion: 5.1
ImageVersion: 13
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 13.0.0.656
ProductVersionNumber: 13.0.0.656
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Builton: Fri 01/12/2024 12:14:19.08
Builtas: UNICODE
CompanyName: Corel Corporation
FileDescription: Corel Update Helper x32
FileVersion: 13.0.0.656
InternalName: Corel Update Helper
LegalCopyright: Copyright(c) 2021 Corel Corporation
LegalTrademarks: Copyright(c) 2021 Corel Corporation
OriginalFileName: CUH.exe
ProductName: Corel Common Framework
ProductVersion: 13.0.0.656
LanguageBuildID: -
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #FLOXIF 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1052"C:\Users\admin\Desktop\2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe" C:\Users\admin\Desktop\2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe
explorer.exe
User:
admin
Company:
Corel Corporation
Integrity Level:
MEDIUM
Description:
Corel Update Helper x32
Exit code:
0
Version:
13.0.0.656
Modules
Images
c:\users\admin\desktop\2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
5556C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 458
Read events
3 450
Write events
8
Delete events
0

Modification events

(PID) Process:(1052) 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Corel\CUH\2.0
Operation:writeName:TaskId
Value:
CorelUpdateHelperTask-B14AE4FE120858F20E85A7AF31DDF1B8
(PID) Process:(1052) 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Corel\PCU
Operation:writeName:model
Value:
DELL|DELL
(PID) Process:(1052) 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Corel\PCU
Operation:writeName:bios
Value:
American Megatrends Inc.
(PID) Process:(1052) 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Corel\PCU
Operation:writeName:cardnumber
Value:
7
(PID) Process:(1052) 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Corel\PCU
Operation:writeName:7
Value:
C21120524153
(PID) Process:(1052) 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Corel\PCU
Operation:writeName:HFNCv2
Value:
C21120524153
(PID) Process:(1052) 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Corel\PCU
Operation:writeName:networkcard
Value:
C21120524153
(PID) Process:(1052) 2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeKey:HKEY_CURRENT_USER\SOFTWARE\Corel\PCU
Operation:writeName:HFIv2
Value:
V28B0013E50ECB5C39F714E2D01D58D94C
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
10522025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeC:\Users\admin\AppData\Local\Temp\conres.dllexecutable
MD5:7574CF2C64F35161AB1292E2F532AABF
SHA256:DE055A89DE246E629A8694BDE18AF2B1605E4B9B493C7E4AEF669DD67ACF5085
10522025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader.exeC:\Users\admin\AppData\Local\Temp\2025-03-24_ad155489d0ef2ac209792e191032516d_amadey_bkransomware_floxif_hijackloader_PCULog0.txttext
MD5:F032204277E7AC8649E0AEB8B092BF5B
SHA256:3A618DE2C97C95DB184572727D71B6050A3B5D087F9421CE12D8DC582F326453
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
20
DNS requests
2
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2564
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5556
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

No threats detected
No debug info