File name:

Malware-02.exe

Full analysis: https://app.any.run/tasks/c9666cae-4b0d-4b18-8a80-540cd36efcc8
Verdict: Malicious activity
Analysis date: April 29, 2025, 17:25:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

2AEA3B217E6A3D08EF684594192CAFC8

SHA1:

3A0B855DD052B2CDC6453F6CBDB858C7B55762B0

SHA256:

0442CFABB3212644C4B894A7E4A7E84C00FD23489CC4F96490F9988E6074B6AB

SSDEEP:

6144:oRzMgpY8bXFHW1FbwwEHidUoagoW2C9cuqBGI4Zq6mYlG8+rNfNQFoQGt485VYs:uDRbXFHW1+K2UWBGIymY/+rheFOvp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Malware-02.exe (PID: 2656)
      • Malware-02.exe (PID: 1276)
  • SUSPICIOUS

    • Application launched itself

      • Malware-02.exe (PID: 2656)
    • Reads security settings of Internet Explorer

      • Malware-02.exe (PID: 2656)
    • There is functionality for taking screenshot (YARA)

      • Malware-02.exe (PID: 1276)
    • Executable content was dropped or overwritten

      • Malware-02.exe (PID: 1276)
  • INFO

    • Checks supported languages

      • Malware-02.exe (PID: 2656)
      • Malware-02.exe (PID: 1276)
    • Reads the computer name

      • Malware-02.exe (PID: 2656)
    • Process checks computer location settings

      • Malware-02.exe (PID: 2656)
    • Creates files in the program directory

      • Malware-02.exe (PID: 1276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (57.2)
.exe | Win32 Executable (generic) (18.2)
.exe | Win16/32 Executable Delphi generic (8.3)
.exe | Generic Win/DOS Executable (8)
.exe | DOS Executable Generic (8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 251392
InitializedDataSize: 126976
UninitializedDataSize: -
EntryPoint: 0x3a4b0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start malware-02.exe malware-02.exe sppextcomobj.exe no specs slui.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1276"C:\Users\admin\AppData\Local\Temp\Malware-02.exe" "runas"C:\Users\admin\AppData\Local\Temp\Malware-02.exe
Malware-02.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\malware-02.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2656"C:\Users\admin\AppData\Local\Temp\Malware-02.exe" C:\Users\admin\AppData\Local\Temp\Malware-02.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\malware-02.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4428"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5008C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
865
Read events
859
Write events
6
Delete events
0

Modification events

(PID) Process:(1276) Malware-02.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:pr
Value:
C:\Program Files (x86)\Malware-02.exe
(PID) Process:(2656) Malware-02.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:pr
Value:
C:\Program Files (x86)\Malware-02.exe
(PID) Process:(1276) Malware-02.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1276) Malware-02.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1276) Malware-02.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
1
Suspicious files
584
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
1276Malware-02.exeC:\$WinREAgent\Backup\email-Johnmen.24@aol.com.ver-CL 1.2.0.0.id-HVFPZHRAJTDLUCLUDNWGQYHQZIRBJTBKTCLT-4@29@2025 5@25@49 PM6865471.randomname-LYISDMCMYISBKTCMWFOYHQZRAKUDNX.GQZ.cbfbinary
MD5:AEBAB810435AD1DB9BAC229AB50B7175
SHA256:1AA91F08CAF3A5266348B24288A78C725C32B7B28E7BA88EA43042CD75E21257
1276Malware-02.exeC:\$WinREAgent\Rollback.xmlbinary
MD5:6D09C8827DAA013DF68EC09D7C9CEDFE
SHA256:7F3D60ED08B6A09A2774143D79D09001FD423867224B1737EB173C2C8379D91E
1276Malware-02.exeC:\$WinREAgent\Backup\location.txtbinary
MD5:AEBAB810435AD1DB9BAC229AB50B7175
SHA256:1AA91F08CAF3A5266348B24288A78C725C32B7B28E7BA88EA43042CD75E21257
1276Malware-02.exeC:\Program Files (x86)\NSYPCDRXVS.QSQtext
MD5:CE36D146F9F8CB8F439099E234E587A9
SHA256:DA2ACAFD89E4BDE4DC06F8B73B867F2E0E4B33D23DDC4A1D90EFA3787827C6AC
1276Malware-02.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\email-Johnmen.24@aol.com.ver-CL 1.2.0.0.id-HVFPZHRAJTDLUCLUDNWGQYHQZIRBJTBKTCLT-4@29@2025 5@25@49 PM6865471.randomname-VHRADMVEPYHQAJSBKTCLUDNWFPYHRZ.JSB.cbfbinary
MD5:6048F9D62051160EB7DAF77AE7F8031F
SHA256:925866E42EAB74F1C5ABFBA9F14D6D81D42E209066D688095166BE98D3EB6E0E
1276Malware-02.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\LICENSE.txtbinary
MD5:37ED28826C67D1CE6DFFB3F7D0633FDF
SHA256:28D4756A363F025AC25D9C3B1E13878F14F7BE17329BFB228D9F74B49965B123
1276Malware-02.exeC:\$WinREAgent\Backup\ReAgent.xmlbinary
MD5:F36B7EEA997C137F58656F27E1212188
SHA256:CBF496320C2EFA22B8462C9D8BC29BCA9CBF1A9375F365F6B8C1A1B55236F649
1276Malware-02.exeC:\$WinREAgent\Backup\email-Johnmen.24@aol.com.ver-CL 1.2.0.0.id-HVFPZHRAJTDLUCLUDNWGQYHQZIRBJTBKTCLT-4@29@2025 5@25@49 PM6865471.randomname-MZIRGPYHQZIRAKTDNWFOYHQAKTCLUD.NWF.cbfbinary
MD5:F36B7EEA997C137F58656F27E1212188
SHA256:CBF496320C2EFA22B8462C9D8BC29BCA9CBF1A9375F365F6B8C1A1B55236F649
1276Malware-02.exeC:\Program Files (x86)\Malware-02.exeexecutable
MD5:2AEA3B217E6A3D08EF684594192CAFC8
SHA256:0442CFABB3212644C4B894A7E4A7E84C00FD23489CC4F96490F9988E6074B6AB
1276Malware-02.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\email-Johnmen.24@aol.com.ver-CL 1.2.0.0.id-HVFPZHRAJTDLUCLUDNWGQYHQZIRBJTBKTCLT-4@29@2025 5@25@49 PM6865471.randomname-RCOXHQZIUDMUATMBRHVJYNCQGUKZPD.TIY.cbfbinary
MD5:37ED28826C67D1CE6DFFB3F7D0633FDF
SHA256:28D4756A363F025AC25D9C3B1E13878F14F7BE17329BFB228D9F74B49965B123
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
19
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.20:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4608
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4608
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.20:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.216.77.20
  • 23.216.77.16
  • 23.216.77.13
  • 23.216.77.17
  • 23.216.77.25
  • 23.216.77.22
  • 23.216.77.27
  • 23.216.77.15
  • 23.216.77.21
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.2
  • 40.126.31.131
  • 20.190.159.2
  • 20.190.159.23
  • 20.190.159.64
  • 40.126.31.0
  • 20.190.159.0
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
shopping-na-divane.ru
malicious
shoptorgvlg.ru
unknown
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

No threats detected
No debug info