File name:

Rizz.exe

Full analysis: https://app.any.run/tasks/ef2fa358-9d7a-4f0e-b883-c2c7ef31c5ec
Verdict: Malicious activity
Analysis date: May 22, 2025, 16:04:12
OS: Windows 11 Professional (build: 22000, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 6 sections
MD5:

0155390AC813EDDBCB5DB0FF1DF25271

SHA1:

4B010DB1811D04339C19736657CBC6F59CE9CAEE

SHA256:

082C168D2364E7D670AB1EEFF480E739C0432176271C499705B7C37B39EBC2B4

SSDEEP:

6144:N1obzNGjj/bqihawuqYzet0YX82ytbC6W2hw5wvjjjPjjjj0:H0R+jAmZvwvjjjPjjjj0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4824)
    • Starts CMD.EXE for commands execution

      • Rizz.exe (PID: 2268)
    • Executing commands from a ".bat" file

      • Rizz.exe (PID: 2268)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 784)
    • Reads the Internet Settings

      • powershell.exe (PID: 784)
      • cmd.exe (PID: 4824)
      • wscript.exe (PID: 3372)
    • Imports DLL using pinvoke

      • powershell.exe (PID: 1428)
    • Changes the desktop background image

      • powershell.exe (PID: 1428)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 5176)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 5176)
    • The process executes VB scripts

      • cmd.exe (PID: 4824)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 4824)
  • INFO

    • Checks supported languages

      • Rizz.exe (PID: 2268)
      • csc.exe (PID: 5176)
      • cvtres.exe (PID: 2028)
    • Create files in a temporary directory

      • Rizz.exe (PID: 2268)
      • csc.exe (PID: 5176)
      • cvtres.exe (PID: 2028)
    • The sample compiled with english language support

      • Rizz.exe (PID: 2268)
    • Disables trace logs

      • powershell.exe (PID: 784)
    • Checks proxy server information

      • powershell.exe (PID: 784)
    • Changes the registry key values via Powershell

      • cmd.exe (PID: 4824)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 5176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.2)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2019:07:30 08:52:08+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware
PEType: PE32+
LinkerVersion: 2.5
CodeSize: 92672
InitializedDataSize: 158720
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
FileVersionNumber: 2.1.0.0
ProductVersionNumber: 2.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileVersion: 2.1.0.0
ProductVersion: 2.0.0.0
ProductName: RizzVirus
OriginalFileName: RizzU
InternalName: Rizz
FileDescription: rizz
CompanyName: WareForge Inc.
LegalTrademarks: Rizz
LegalCopyright: Script Copyright©
PrivateBuild: None
SpecialBuild: None
Comments: so rizz ??????
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
111
Monitored processes
12
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start rizz.exe no specs conhost.exe no specs cmd.exe no specs powershell.exe svchost.exe powershell.exe no specs csc.exe cvtres.exe no specs wscript.exe no specs timeout.exe no specs wscript.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\speech.vbs" C:\Windows\System32\wscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
784powershell -Command "Invoke-WebRequest -Uri 'https://i.postimg.cc/7P96ygVv/Betsy-Sigma-Boy-Official-Music-Video-You-Tube-Google-Chrome-2025-05-22-17.png' -OutFile 'C:\Users\admin\AppData\Local\Temp\rizz_wallpaper.jpg'"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1428powershell -Command "Set-ItemProperty -Path 'HKCU:\Control Panel\Desktop\' -Name Wallpaper -Value 'C:\Users\admin\AppData\Local\Temp\rizz_wallpaper.jpg'; Add-Type -TypeDefinition 'using System; using System.Runtime.InteropServices; public class Wallpaper { [DllImport(\"user32.dll\")] public static extern int SystemParametersInfo(int uAction, int uParam, string lpvParam, int fuWinIni); }'; [Wallpaper]::SystemParametersInfo(20, 0, 'C:\Users\admin\AppData\Local\Temp\rizz_wallpaper.jpg', 3)"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
1664C:\Windows\system32\svchost.exe -k NetworkService -pC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
2028C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES596F.tmp" "c:\Users\admin\AppData\Local\Temp\CSCFD1BB8A47BB4379A6E15D18BDEC8255.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\vcruntime140_1_clr0400.dll
c:\windows\system32\vcruntime140_clr0400.dll
2268"C:\Users\admin\Desktop\Rizz.exe" C:\Users\admin\Desktop\Rizz.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\rizz.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
3324timeout 1 C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3372"C:\Windows\System32\WScript.exe" "C:\Users\admin\Desktop\speech.vbs" C:\Windows\System32\wscript.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
4124\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeRizz.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
4824"C:\Windows\system32\cmd" /c "C:\Users\admin\AppData\Local\Temp\401B.tmp\401C.tmp\401D.bat C:\Users\admin\Desktop\Rizz.exe"C:\Windows\System32\cmd.exeRizz.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.22000.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
Total events
13 555
Read events
13 363
Write events
192
Delete events
0

Modification events

(PID) Process:(1428) powershell.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:Wallpaper
Value:
C:\Users\admin\AppData\Local\Temp\rizz_wallpaper.jpg
(PID) Process:(4824) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts
Operation:writeName:VBSFile_.vbs
Value:
0
(PID) Process:(4824) cmd.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\System32\WScript.exe.FriendlyAppName
Value:
Microsoft ® Windows Based Script Host
(PID) Process:(4824) cmd.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\Windows\System32\WScript.exe.ApplicationCompany
Value:
Microsoft Corporation
(PID) Process:(4824) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(4824) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(4824) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(4824) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(4824) cmd.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3372) wscript.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
1
Suspicious files
4
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
784powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_d2iieozt.3cr.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2268Rizz.exeC:\Users\admin\AppData\Local\Temp\401B.tmp\401C.tmp\401D.battext
MD5:6B1CB29B56D5109D62CF569E4FEE88CE
SHA256:A4CA301D2906A697C54037702D4CBAC55F1AA82C9B15936B5C20EF5DAD7DD6A7
784powershell.exeC:\Users\admin\AppData\Local\Temp\rizz_wallpaper.jpgimage
MD5:AF0AF18ACFAE531ECD2505CDFFEC0A6E
SHA256:C2D1502A513B9224B6E1DFBB4D7D93895388105AEE561B470E414C64307AEE94
784powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ar34bjfy.daw.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5176csc.exeC:\Users\admin\AppData\Local\Temp\CSCFD1BB8A47BB4379A6E15D18BDEC8255.TMPbinary
MD5:1850ABCF7F67B03C02481A98CD493C6A
SHA256:DA4658B94B668D26FEF84E92452AC517A600A570FC8D5C92DB8A165372BC970E
2028cvtres.exeC:\Users\admin\AppData\Local\Temp\RES596F.tmpbinary
MD5:4F96CD120690726D7671D1E867BDE86F
SHA256:02FD4ADA0961D5FDAF54116332FA3B104C30DED39E5515241762A665409BE3B6
5176csc.exeC:\Users\admin\AppData\Local\Temp\3jfqpvpe.dllexecutable
MD5:3623F5EE210B36854082C35FD2775AE7
SHA256:3A483B56AE5C63D3EEA4950D126FDCB838AFF3F371F45AA8ED8D3FAF84C48659
1428powershell.exeC:\Users\admin\AppData\Local\Temp\3jfqpvpe.0.cstext
MD5:737C81CE219766E0762F72B283818C3C
SHA256:E52F2AC7D595E9F088882339BDF38A6F92332DDF0ACEEDF5FA06C561ACF2B1BD
1428powershell.exeC:\Users\admin\AppData\Local\Temp\3jfqpvpe.cmdlinetext
MD5:A098A9C4ABC0ADBD5057F6C4D070AB02
SHA256:7379FD8A7B28DCB307377C95367B64EC2B899F3AEF660D07914186388894CEA7
3372wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_747A66009FD8464B892F57626C56464D.datbinary
MD5:06C355BBCF6F7D67B2058AACFD003923
SHA256:81DE326F589FCD6FDC3202D524C38BE646DCBD7CF2FC38970D68D9E03D0EA665
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
15
DNS requests
11
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
200
40.126.31.0:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
5812
MoUsoCoreWorker.exe
GET
200
199.232.210.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f2fbad1876816921
unknown
whitelisted
POST
200
40.126.31.0:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
POST
200
40.126.31.3:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
POST
200
4.231.66.184:443
https://checkappexec.microsoft.com/windows/shell/actions
unknown
binary
182 b
whitelisted
GET
200
2.18.64.197:80
http://www.msftconnecttest.com/connecttest.txt
unknown
whitelisted
GET
200
104.21.85.204:443
https://i.postimg.cc/7P96ygVv/Betsy-Sigma-Boy-Official-Music-Video-You-Tube-Google-Chrome-2025-05-22-17.png
unknown
HEAD
200
23.212.222.21:443
https://fs.microsoft.com/fs/windows/config.json
unknown
GET
200
23.212.222.21:443
https://fs.microsoft.com/fs/windows/config.json
unknown
binary
55 b
whitelisted
2768
svchost.exe
GET
200
208.89.74.31:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?74f19306e9a7f92f
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2.18.64.197:80
Administracion Nacional de Telecomunicaciones
UY
unknown
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5812
MoUsoCoreWorker.exe
199.232.210.172:80
ctldl.windowsupdate.com
FASTLY
US
whitelisted
3640
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1924
smartscreen.exe
51.137.3.145:443
checkappexec.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
784
powershell.exe
162.249.168.129:443
i.postimg.cc
PUREVOLTAGE-INC
US
whitelisted
1084
svchost.exe
23.212.222.21:443
fs.microsoft.com
AKAMAI-AS
AU
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
2768
svchost.exe
208.89.74.31:80
ctldl.windowsupdate.com
US
whitelisted
2988
OfficeClickToRun.exe
20.189.173.1:443
self.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
ctldl.windowsupdate.com
  • 199.232.210.172
  • 199.232.214.172
  • 208.89.74.31
  • 208.89.74.17
  • 208.89.74.29
  • 208.89.74.23
  • 208.89.74.27
  • 208.89.74.21
  • 208.89.74.19
whitelisted
login.live.com
  • 20.190.159.130
  • 20.190.159.68
  • 40.126.31.67
  • 40.126.31.2
  • 20.190.159.131
  • 40.126.31.0
  • 20.190.159.64
  • 40.126.31.71
  • 20.190.160.2
  • 20.190.160.4
  • 40.126.32.138
  • 40.126.32.76
  • 40.126.32.72
  • 40.126.32.140
  • 20.190.160.5
  • 20.190.160.20
whitelisted
checkappexec.microsoft.com
  • 51.137.3.145
whitelisted
i.postimg.cc
  • 162.249.168.129
whitelisted
dns.msftncsi.com
  • 131.107.255.255
whitelisted
fs.microsoft.com
  • 23.212.222.21
whitelisted
self.events.data.microsoft.com
  • 20.189.173.1
whitelisted

Threats

PID
Process
Class
Message
Misc activity
ET INFO Microsoft Connection Test
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
A Network Trojan was detected
ET HUNTING Suspicious POST With Reference to WINDOWS Folder Possible Malware Infection
1664
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
No debug info