File name:

1 (669)

Full analysis: https://app.any.run/tasks/19b8cde6-a1c1-4271-b002-6fd4ae0b7f1c
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 25, 2025, 01:23:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

71F0F113973996F30BA15632D0A57F30

SHA1:

605FA3B2F26982DECB0224F85420FA6EC52C912C

SHA256:

0F26E133BFEE76DCF249AD313F19E94CF2DBFBBB88E95CB7F103676368D945F2

SSDEEP:

6144:+TCwykeg2XYfVJu5pUhxO34AqOc0DXmKYGeqaFvoM9hvEZCk0fZxQdSfhJO3f:+gWsUhnNl9VoMLvYCk0rQdS5JO3f

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • 5064973aa98c4.exe (PID: 1276)
    • Actions looks like stealing of personal data

      • 5064973aa98c4.exe (PID: 1276)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • 1 (669).exe (PID: 1452)
    • Executable content was dropped or overwritten

      • 1 (669).exe (PID: 1452)
      • 5064973aa98c4.exe (PID: 1276)
    • Reads security settings of Internet Explorer

      • 5064973aa98c4.exe (PID: 1276)
    • Creates a software uninstall entry

      • 5064973aa98c4.exe (PID: 1276)
    • Creates/Modifies COM task schedule object

      • 5064973aa98c4.exe (PID: 1276)
  • INFO

    • Create files in a temporary directory

      • 1 (669).exe (PID: 1452)
      • 5064973aa98c4.exe (PID: 1276)
    • The sample compiled with english language support

      • 1 (669).exe (PID: 1452)
      • 5064973aa98c4.exe (PID: 1276)
    • Checks supported languages

      • 5064973aa98c4.exe (PID: 1276)
      • 1 (669).exe (PID: 1452)
    • Reads the computer name

      • 5064973aa98c4.exe (PID: 1276)
    • Creates files or folders in the user directory

      • 5064973aa98c4.exe (PID: 1276)
    • Creates files in the program directory

      • 5064973aa98c4.exe (PID: 1276)
    • Reads the software policy settings

      • slui.exe (PID: 7352)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:11:18 16:27:35+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 104960
InitializedDataSize: 35328
UninitializedDataSize: -
EntryPoint: 0x14b04
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 9.20.0.0
ProductVersionNumber: 9.20.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 9.2
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2010 Igor Pavlov
OriginalFileName: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 9.2
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 1 (669).exe 5064973aa98c4.exe sppextcomobj.exe no specs slui.exe slui.exe no specs 1 (669).exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1276.\5064973aa98c4.exe /sC:\Users\admin\AppData\Local\Temp\7zSBCBA.tmp\5064973aa98c4.exe
1 (669).exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7zsbcba.tmp\5064973aa98c4.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1452"C:\Users\admin\AppData\Local\Temp\1 (669).exe" C:\Users\admin\AppData\Local\Temp\1 (669).exe
explorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7z Setup SFX
Exit code:
0
Version:
9.20
Modules
Images
c:\users\admin\appdata\local\temp\1 (669).exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
4696"C:\Users\admin\AppData\Local\Temp\1 (669).exe" C:\Users\admin\AppData\Local\Temp\1 (669).exeexplorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7z Setup SFX
Exit code:
3221226540
Version:
9.20
Modules
Images
c:\users\admin\appdata\local\temp\1 (669).exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5408C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7308C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7352"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 116
Read events
1 088
Write events
22
Delete events
6

Modification events

(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Mozilla\Firefox\Extensions
Operation:writeName:5064973aa9770@5064973aa97a9.com
Value:
C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\5064973aa9770@5064973aa97a9.com
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Chrome\Extensions\cflnobkbapmclldpkapdnpenlagembhm
Operation:writeName:path
Value:
C:\ProgramData\Download and Sa\cflnobkbapmclldpkapdnpenlagembhm.crx
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Chrome\Extensions\cflnobkbapmclldpkapdnpenlagembhm
Operation:writeName:version
Value:
7.1
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCAF872F-DFEE-6BA9-C58A-CDB7ECC8D4E4}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BCAF872F-DFEE-6BA9-C58A-CDB7ECC8D4E4}
Operation:writeName:NoExplorer
Value:
1
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCAF872F-DFEE-6BA9-C58A-CDB7ECC8D4E4}\InprocServer32
Operation:delete keyName:(default)
Value:
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCAF872F-DFEE-6BA9-C58A-CDB7ECC8D4E4}\ProgID
Operation:delete keyName:(default)
Value:
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCAF872F-DFEE-6BA9-C58A-CDB7ECC8D4E4}\Programmable
Operation:delete keyName:(default)
Value:
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCAF872F-DFEE-6BA9-C58A-CDB7ECC8D4E4}\VersionIndependentProgID
Operation:delete keyName:(default)
Value:
(PID) Process:(1276) 5064973aa98c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCAF872F-DFEE-6BA9-C58A-CDB7ECC8D4E4}
Operation:delete keyName:(default)
Value:
Executable files
7
Suspicious files
8
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
14521 (669).exeC:\Users\admin\AppData\Local\Temp\7zSBCBA.tmp\5064973aa9770@5064973aa97a9.com\bootstrap.jsbinary
MD5:76FED445D4452F8D818933943DC529A4
SHA256:2BAB5416E5F09B708A527A3ED7CB56DFBD3E6CF5B3A5401771C4462636EEFC0E
14521 (669).exeC:\Users\admin\AppData\Local\Temp\7zSBCBA.tmp\5064973aa9770@5064973aa97a9.com\content\bg.jsbinary
MD5:8AA0E18C7A5CF983DDFD8683F0B92150
SHA256:B2D85B1040E06CAA1EFB2603931EC8C0E172CDAF1EAA1B0E99E740AD8B4D593B
14521 (669).exeC:\Users\admin\AppData\Local\Temp\7zSBCBA.tmp\5064973aa996d.jstext
MD5:99FA5D714D971A49B67DE27E0D8871BE
SHA256:F560D76474380DA948A0C5AB8682DC026822D9685268C592F315224B1B968BF6
14521 (669).exeC:\Users\admin\AppData\Local\Temp\7zSBCBA.tmp\5064973aa9935.htmlhtml
MD5:BC7D993D9115685327935321A3384503
SHA256:27D6909C9BFAAE65B5C35AEE54B1BCD0EE585D6DBAECA57113BD96FA43421C5E
14521 (669).exeC:\Users\admin\AppData\Local\Temp\7zSBCBA.tmp\5064973aa9770@5064973aa97a9.com\chrome.manifesttext
MD5:010D74DEEC10244611C5ABD8F0B42F33
SHA256:4B1829FFD2F1B4A9E98CAA30F645642EBB4F6EEED24620ED6199A2A46E8AC36A
12765064973aa98c4.exeC:\Users\admin\AppData\Local\Temp\nsxBDD4.tmp\UserInfo.dllexecutable
MD5:7579ADE7AE1747A31960A228CE02E666
SHA256:564C80DEC62D76C53497C40094DB360FF8A36E0DC1BDA8383D0F9583138997F5
12765064973aa98c4.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\5064973aa9770@5064973aa97a9.com\install.rdfxml
MD5:62C66DFE4F826A11CA942A70C858470B
SHA256:3D9C443171DF36B0F01FF779E946EE42E1D03316A3D649C7828AD67184493483
12765064973aa98c4.exeC:\ProgramData\Download and Sa\cflnobkbapmclldpkapdnpenlagembhm.crxbinary
MD5:8CC9BE13708B20E532B73CBA236E6110
SHA256:AA368DAAA1658169487D92AC7CCDCF0418909ADAC6BA541F90617FC582D3174F
12765064973aa98c4.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\5064973aa9770@5064973aa97a9.com\content\bg.jsbinary
MD5:8AA0E18C7A5CF983DDFD8683F0B92150
SHA256:B2D85B1040E06CAA1EFB2603931EC8C0E172CDAF1EAA1B0E99E740AD8B4D593B
12765064973aa98c4.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\5064973aa9770@5064973aa97a9.com\content\zy.xulxml
MD5:52CBE40AA0C9587DDF06D09208018A48
SHA256:1E0D7BD14C9A6A826C8E69566C467CD7B7B429DF93CFD9B51E1FC6C4E5FEC2C7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
7196
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
unknown
8104
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
8104
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5496
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6544
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
unknown
5216
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
7196
backgroundTaskHost.exe
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
unknown
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 20.73.194.208
  • 51.104.136.2
unknown
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
unknown
client.wns.windows.com
  • 40.115.3.253
  • 20.198.162.76
unknown
login.live.com
  • 40.126.32.76
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.68
  • 40.126.32.74
  • 20.190.160.4
  • 20.190.160.17
  • 20.190.160.130
unknown
ocsp.digicert.com
  • 184.30.131.245
unknown
arc.msn.com
  • 20.223.35.26
unknown
slscr.update.microsoft.com
  • 20.109.210.53
unknown
www.microsoft.com
  • 95.101.149.131
unknown
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
unknown

Threats

No threats detected
No debug info