File name:

026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52

Full analysis: https://app.any.run/tasks/67ab6489-8435-4910-9f32-5196e90867aa
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: September 23, 2024, 11:16:24
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
crypto-regex
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

1339FCA8579859D4A31F0D89066AB880

SHA1:

D6785BE15D5E53500D7FED09AA1FF94ED3267631

SHA256:

026978405E9B4945CE575C7BE782511D2CAC81345F1F1441E046C74E8D8E1C52

SSDEEP:

98304:pKIitTRL3+NWBCZBgG33/vVQm57pcdsoI9PolRhgTaOhsVw8+t3bRhnb+7grc+OT:w7s

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1236)
      • powershell.exe (PID: 1128)
    • Changes powershell execution policy (Bypass)

      • 026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe (PID: 1116)
  • SUSPICIOUS

    • The process bypasses the loading of PowerShell profile settings

      • 026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe (PID: 1116)
    • The process executes Powershell scripts

      • 026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe (PID: 1116)
    • Found regular expressions for crypto-addresses (YARA)

      • launcher-windows_amd64.exe (PID: 6424)
    • Starts POWERSHELL.EXE for commands execution

      • 026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe (PID: 1116)
    • Executable content was dropped or overwritten

      • 026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe (PID: 1116)
  • INFO

    • Checks supported languages

      • 026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe (PID: 1116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 3
CodeSize: 10403328
InitializedDataSize: 719872
UninitializedDataSize: -
EntryPoint: 0x6cdc0
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs THREAT launcher-windows_amd64.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1116"C:\Users\admin\Desktop\026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe" C:\Users\admin\Desktop\026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
1128PowerShell -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Local\Temp\e0334048-2487-4267-62c1-0108f886428a.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
1236PowerShell -ExecutionPolicy Bypass -File C:\Users\admin\AppData\Local\Temp\3e315295-0d74-4b42-51c5-aa76f386c894.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2936\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
4520powershell -NoProfile Get-StartAppsC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6424C:\Users\admin\mlx\deps\launcher\1.51.0\launcher-windows_amd64.exeC:\Users\admin\mlx\deps\launcher\1.51.0\launcher-windows_amd64.exe
026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exe
User:
admin
Integrity Level:
MEDIUM
6696\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7112\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exelauncher-windows_amd64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Total events
14 492
Read events
14 492
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
1
Text files
14
Unknown types
0

Dropped files

PID
Process
Filename
Type
4520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3rvwgqrz.xmj.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qgnpjd3z.dnh.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
1116026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exeC:\Users\admin\AppData\Local\Temp\systray_temp_icon_6988de2126ee64fcaf0cf22b61bc7bacimage
MD5:6988DE2126EE64FCAF0CF22B61BC7BAC
SHA256:6CBEC97E7F4DB389A9ACDA556E6F2FC1420F40AE3222DC36D7135FA86C3E1379
4520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ylgcx5bs.pww.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4520powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_gy2w1npo.3s1.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
1236powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rafbql4g.vsa.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
1116026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exeC:\Users\admin\AppData\Local\Temp\launcher3446377371text
MD5:BBE2EA93D8EB5803C8865FF76DAA849A
SHA256:F6A0B9759D1AF128DD09BB3F49812C052C89168E7B159E6D269036A2FABA3260
1116026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exeC:\Users\admin\AppData\Local\Temp\3e315295-0d74-4b42-51c5-aa76f386c894.ps1text
MD5:F5214D9CF208560C6C3926457C386A8E
SHA256:3934519B62BE5D52D33F19A3E395780F103F35A86480E6CE71642818BD4B73B9
4520powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:ADA797302FE1682DF964E0BF03CBA63C
SHA256:43ADC8054B88510161CFC5B5DA1C62F8D0C34F364CA2280A07657752CAA3E5DC
1116026978405e9b4945ce575c7be782511d2cac81345f1f1441e046c74e8d8e1c52.exeC:\Users\admin\AppData\Local\Temp\launcher1136393091executable
MD5:BEAC211460EDAAE5F133D860A2DAE085
SHA256:003642F529A938A05F45AEC6EB55B5D7A4B714D2B23AD220B9E397B1A6D62B6E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1288
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2120
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2264
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
16.12.19.22:443
https://mlxdists.s3.eu-west-3.amazonaws.com/launcher/latest
unknown
text
7 b
GET
200
3.5.225.173:443
https://mlxdists.s3.eu-west-3.amazonaws.com/launcher/1.51.0/launcher-windows_amd64.exe
unknown
executable
27.3 Mb
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1288
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2264
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.42.72.131:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
2.23.209.182:443
Akamai International B.V.
GB
unknown
4
System
192.168.100.255:138
whitelisted
1288
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2120
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 172.217.16.206
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
mlxdists.s3.eu-west-3.amazonaws.com
  • 16.12.20.26
  • 52.95.156.44
shared
launcher.mlx.yt
  • 127.0.0.1
unknown

Threats

No threats detected
No debug info