File name:

Handler.exe

Full analysis: https://app.any.run/tasks/82ce1a92-36c8-4988-b231-d33fd2e0252e
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 16, 2025, 01:00:42
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
telegram
stealer
netreactor
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 4 sections
MD5:

5FD322CE6E87BAE023155E3D548D7280

SHA1:

1E193832DA505B7416F01A108E134D4CFB56F6E5

SHA256:

1D16053D1910BA274B25D60A462FD4E7B75AE1454315DBFCF013B872F02DCDF3

SSDEEP:

12288:13zzNgE/7o+J3wJKjTg2kxFkELL2p88/74DHVh8O/V1CHENhZa:9PNgE/7o+J3w4jDkxFkELL2p88/74D1a

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • Handler.exe (PID: 6232)
  • SUSPICIOUS

    • Executes application which crashes

      • Handler.exe (PID: 4684)
    • Application launched itself

      • Handler.exe (PID: 4684)
    • Reads security settings of Internet Explorer

      • Handler.exe (PID: 6232)
    • Checks Windows Trust Settings

      • Handler.exe (PID: 6232)
    • Searches for installed software

      • Handler.exe (PID: 6232)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Handler.exe (PID: 6232)
  • INFO

    • Checks supported languages

      • Handler.exe (PID: 4684)
      • Handler.exe (PID: 6232)
    • Creates files in the program directory

      • Handler.exe (PID: 6232)
    • Reads the computer name

      • Handler.exe (PID: 4684)
      • Handler.exe (PID: 6232)
    • Reads the machine GUID from the registry

      • Handler.exe (PID: 6232)
    • Reads the software policy settings

      • Handler.exe (PID: 6232)
      • WerFault.exe (PID: 6460)
    • Checks proxy server information

      • Handler.exe (PID: 6232)
      • WerFault.exe (PID: 6460)
    • Creates files or folders in the user directory

      • Handler.exe (PID: 6232)
      • WerFault.exe (PID: 6460)
    • Reads product name

      • Handler.exe (PID: 6232)
    • Reads Environment values

      • Handler.exe (PID: 6232)
    • Reads CPU info

      • Handler.exe (PID: 6232)
    • .NET Reactor protector has been detected

      • Handler.exe (PID: 4684)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (62)
.exe | Win64 Executable (generic) (23.3)
.dll | Win32 Dynamic Link Library (generic) (5.5)
.exe | Win32 Executable (generic) (3.8)
.exe | Win16/32 Executable Delphi generic (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2075:10:15 09:16:44+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 58368
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x1039e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Handler
FileVersion: 1.0.0.0
InternalName: Handler.exe
LegalCopyright: Copyright © 2025
LegalTrademarks: -
OriginalFileName: Handler.exe
ProductName: Handler
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start handler.exe handler.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
4684"C:\Users\admin\AppData\Local\Temp\Handler.exe" C:\Users\admin\AppData\Local\Temp\Handler.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Handler
Exit code:
3221226505
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\handler.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6232"C:\Users\admin\AppData\Local\Temp\Handler.exe"C:\Users\admin\AppData\Local\Temp\Handler.exe
Handler.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Handler
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\handler.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6460C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4684 -s 792C:\Windows\SysWOW64\WerFault.exe
Handler.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
3 758
Read events
3 755
Write events
3
Delete events
0

Modification events

(PID) Process:(6232) Handler.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6232) Handler.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6232) Handler.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
10
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6460WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Handler.exe_cc83c85af855e580773a9a57496a8f99a7379e_d95619b5_d6d26a6c-04a6-47f2-9e17-af67249f4b0f\Report.wer
MD5:
SHA256:
6460WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Handler.exe.4684.dmp
MD5:
SHA256:
6232Handler.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D22E9CDB61B8D6AC758750E0B7D36A48binary
MD5:BD410FB7A6E1BD1B2AF0B8A84FA472A5
SHA256:581908AA1BBD43897E6275935F981711FE744A8C86383D5917779BF51399C14A
6460WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:75D31BF2717D057DA7140EF390E3C565
SHA256:F688BAA3F9BE8670810CD0B4028D12236773FC0DD83667B55C05EBA49DCF8D2A
6460WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6232Handler.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D22E9CDB61B8D6AC758750E0B7D36A48binary
MD5:17628739E4D48E20E272B7BB4E4162ED
SHA256:CC08EC6216492BA62A916614A71831A5B2EBC0DCAE8048E930A1B5C91B8E4676
6460WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5EFE.tmp.xmlxml
MD5:9ABB1E56B48BFE19B709F70E9337F823
SHA256:5D92AEC103170561BA0AEC5EDD316D65F683F77000D926195FF4B6D0F33FFF9B
6460WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
6232Handler.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751binary
MD5:E192462F281446B5D1500D474FBACC4B
SHA256:F1BA9F1B63C447682EBF9DE956D0DA2A027B1B779ABEF9522D347D3479139A60
6232Handler.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:B05EC02B00119868A9C051B1F02C487E
SHA256:08B1649B05F7A148B5EC0D8D4B38DD7ED43F031AF981A5F26E8524CF2C4FBB89
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
45
DNS requests
24
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5004
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5004
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6232
Handler.exe
GET
200
95.101.54.114:80
http://e6.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBTUejiAQejpjQc4fOz2ttjyD6VkMQQUDcXM%2FZvuFAWhTDCCpT5eisNYCdICEgNnYekoOXkvxwDQ7CWzcordLQ%3D%3D
unknown
whitelisted
6232
Handler.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
6460
WerFault.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6460
WerFault.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5004
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5004
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
2.21.65.154:443
www.bing.com
Akamai International B.V.
NL
whitelisted
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4
System
192.168.100.255:138
whitelisted
6232
Handler.exe
149.154.167.99:443
t.me
Telegram Messenger Inc
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
www.bing.com
  • 2.21.65.154
  • 2.21.65.132
whitelisted
google.com
  • 142.250.185.206
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
t.me
  • 149.154.167.99
whitelisted
legalize.live
  • 116.203.164.230
unknown
login.live.com
  • 20.190.160.20
  • 40.126.32.138
  • 40.126.32.136
  • 40.126.32.134
  • 40.126.32.72
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.68
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted

Threats

PID
Process
Class
Message
6232
Handler.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
1 ETPRO signatures available at the full report
No debug info