File name:

23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7

Full analysis: https://app.any.run/tasks/d1e02dc6-864a-4bdc-a821-b93fec17a9a3
Verdict: Malicious activity
Analysis date: May 10, 2025, 05:58:33
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
telegram
evasion
ims-api
generic
themida
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 12 sections
MD5:

182A9850EE4CF91F941B34ACD7925347

SHA1:

FB7C02C597D14B47F486FE602753320FEDDABB1B

SHA256:

23D2A6FAE1B12109CDE18238A60A9E88991619B5C70452F99FCAB33C650C60E7

SSDEEP:

196608:xMlSxqhOVC3WSnZ470HaG/Ohz0q2CZxhxaObM+IUD4cToeVEe:xMlSYOVCdZmIa6Wnb3xHbMO42oed

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Executable content was dropped or overwritten

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Process drops legitimate windows executable

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Reads security settings of Internet Explorer

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Potential Corporate Privacy Violation

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
  • INFO

    • Checks supported languages

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Reads mouse settings

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • The sample compiled with english language support

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Create files in a temporary directory

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Reads the computer name

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Creates files in the program directory

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Reads CPU info

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Creates files or folders in the user directory

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Checks proxy server information

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Reads the software policy settings

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Themida protector has been detected

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • The process uses AutoIt

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
    • Attempting to use instant messaging service

      • 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe (PID: 7192)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:28 07:38:03+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.16
CodeSize: 734208
InitializedDataSize: 22956032
UninitializedDataSize: -
EntryPoint: 0x1e384d0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 25.0.0.2025
ProductVersionNumber: 25.0.0.2025
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Realtek Semiconductor
FileDescription: Realtek HD Audio
FileVersion: 25.0.0.2025
InternalName: RtHDVBgProc.exe
LegalCopyright: 2017 (c) Realtek Semiconductor. All rights reserved.
OriginalFileName: taskhostw.exe
ProductName: Realtek HD Audio
ProductVersion: 25.0.0.2025
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe svchost.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
7192"C:\Users\admin\AppData\Local\Temp\23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe" C:\Users\admin\AppData\Local\Temp\23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe
explorer.exe
User:
admin
Company:
Realtek Semiconductor
Integrity Level:
MEDIUM
Description:
Realtek HD Audio
Version:
25.0.0.2025
Modules
Images
c:\users\admin\appdata\local\temp\23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\msvcrt.dll
7852C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
701
Read events
669
Write events
3
Delete events
29

Modification events

(PID) Process:(7192) 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7192) 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7192) 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7192) 23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
Operation:delete valueName:Realtek HD Audio
Value:
Executable files
1
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
719223d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exeC:\ProgramData\Setup\bip39.txttext
MD5:51CA2264F5B3AD532A4D6DAE175E1750
SHA256:D2BD2AEB50AC5DF60C1EB10AFCEC2B680D5A8A9F2BBC74A15C45BF3525528334
719223d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\json[1].jsonbinary
MD5:27CB226EBB56F12250D9CE5CD43EF01B
SHA256:FA10104E74E0366067A0D07BC04A5F97C1547AC0C0C62CEC2D62586B9E02EA9D
719223d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exeC:\Users\admin\AppData\Local\Temp\aut916.tmpbinary
MD5:52B38C5025C2ECFA9A101E97CC48BFDF
SHA256:D35F48DF7A4B20E7213B9530A9401F52D8EEEF833EFD0836583A841835BAFDC1
719223d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exeC:\Users\admin\AppData\Local\Temp\aut126.tmpexecutable
MD5:608E6BC28C8DC492A1BBE983962B78FD
SHA256:C65EA1C461F9189510633DDD67C93CE23E84D4D81B56C8CA78553D0DEC861455
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
22
DNS requests
19
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7192
23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
7664
SIHClient.exe
GET
200
2.20.154.94:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7664
SIHClient.exe
GET
200
2.20.154.94:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5024
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7192
23d2a6fae1b12109cde18238a60a9e88991619b5c70452f99fcab33c650c60e7.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.20.154.94
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.73
  • 40.126.31.0
  • 20.190.159.2
  • 20.190.159.130
  • 20.190.159.131
  • 20.190.159.68
  • 20.190.159.71
  • 40.126.31.3
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
www.google.com
  • 142.250.186.164
whitelisted
api.telegram.org
  • 149.154.167.220
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET INFO Autoit Windows Automation tool User-Agent in HTTP Request - Possibly Hostile
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
Misc activity
ET HUNTING Telegram API Domain in DNS Lookup
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
Misc activity
ET HUNTING Telegram API Certificate Observed
No debug info