File name:

ZyuL.io AHK Camlock V1.3.1.exe

Full analysis: https://app.any.run/tasks/ecb4544d-647c-4645-a9d9-4e6578f58f09
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 02, 2025, 20:34:48
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ahk
loader
autohotkey
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

35C0CF97DD71D2C6E295F635E47B9CE2

SHA1:

55ACC15EA92A0EDDA365BB670B8468930734A507

SHA256:

0A5B2FEFBB8EA9D413D0ED5BC81ADBB9B2A250EE2ADA42A0B645A5DFDD157A59

SSDEEP:

49152:3lsB2GN2EkDYPreBbhujEojHpfqCo14J/:3PGoxDYDedufjxqR1Q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • AHK has been detected (YARA)

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 4896)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 6540)
    • Application launched itself

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 2800)
      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 6540)
      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 456)
    • AUTOHOTKEY mutex has been found

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 456)
    • There is functionality for taking screenshot (YARA)

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 4896)
  • INFO

    • Process checks computer location settings

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 6540)
    • Reads the computer name

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 6540)
      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 2800)
      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 456)
      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 4896)
    • Checks supported languages

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 6540)
      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 2800)
      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 456)
      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 4896)
    • The sample compiled with english language support

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 6540)
    • Detects AutoHotkey samples (YARA)

      • ZyuL.io AHK Camlock V1.3.1.exe (PID: 4896)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (35.8)
.exe | Win64 Executable (generic) (31.7)
.scr | Windows screen saver (15)
.dll | Win32 Dynamic Link Library (generic) (7.5)
.exe | Win32 Executable (generic) (5.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:16 06:02:19+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 705024
InitializedDataSize: 552448
UninitializedDataSize: -
EntryPoint: 0x9d3b0
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.1.37.2
ProductVersionNumber: 1.1.37.2
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 1.1.37.02a0
ProductVersion: 1.1.37.02a0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start zyul.io ahk camlock v1.3.1.exe no specs zyul.io ahk camlock v1.3.1.exe #AUTOHOTKEY zyul.io ahk camlock v1.3.1.exe no specs #AHK zyul.io ahk camlock v1.3.1.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
456"C:\Users\admin\AppData\Local\Temp\ZyuL.io AHK Camlock V1.3.1.exe" /script /f "\\.\pipe\AHKOLMFEFPC" C:\Users\admin\AppData\Local\Temp\ZyuL.io AHK Camlock V1.3.1.exe
ZyuL.io AHK Camlock V1.3.1.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.1.37.02a0
Modules
Images
c:\users\admin\appdata\local\temp\zyul.io ahk camlock v1.3.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
2800"C:\Users\admin\AppData\Local\Temp\ZyuL.io AHK Camlock V1.3.1.exe" /restartC:\Users\admin\AppData\Local\Temp\ZyuL.io AHK Camlock V1.3.1.exe
ZyuL.io AHK Camlock V1.3.1.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.1.37.02a0
Modules
Images
c:\users\admin\appdata\local\temp\zyul.io ahk camlock v1.3.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
4620"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4896"C:\Users\admin\AppData\Local\Temp\ZyuL.io AHK Camlock V1.3.1.exe" /script /f "\\.\pipe\AHKOLMIPCOC" C:\Users\admin\AppData\Local\Temp\ZyuL.io AHK Camlock V1.3.1.exe
ZyuL.io AHK Camlock V1.3.1.exe
User:
admin
Integrity Level:
HIGH
Exit code:
2
Version:
1.1.37.02a0
Modules
Images
c:\users\admin\appdata\local\temp\zyul.io ahk camlock v1.3.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6540"C:\Users\admin\AppData\Local\Temp\ZyuL.io AHK Camlock V1.3.1.exe" C:\Users\admin\AppData\Local\Temp\ZyuL.io AHK Camlock V1.3.1.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.1.37.02a0
Modules
Images
c:\users\admin\appdata\local\temp\zyul.io ahk camlock v1.3.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
6808C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
462
Read events
462
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
208
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
208
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.147:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
208
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.147
  • 23.48.23.155
  • 23.48.23.141
  • 23.48.23.143
  • 23.48.23.146
  • 23.48.23.149
  • 23.48.23.145
  • 23.48.23.140
  • 23.48.23.153
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.73
  • 40.126.31.128
  • 20.190.159.64
  • 40.126.31.1
  • 20.190.159.2
  • 40.126.31.71
  • 40.126.31.129
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info