File name:

Andy_47.260_1096_26_x64.exe

Full analysis: https://app.any.run/tasks/2d99ddd3-bca3-4415-a668-5503fbb22dc0
Verdict: Malicious activity
Analysis date: February 04, 2024, 10:49:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

00F93A78B4E447C8D80E588878B8D99E

SHA1:

AC1508D0DE07079ACC7A12FC45885456305766B2

SHA256:

270453AADA7A064E133890794E84270599723B3BFA0121104ABDAD1A79A13B7B

SSDEEP:

98304:wFlT8qeEpbDZ+JC2HzGXRbGlAwt6QgCqlJCN+GL0AG+G/s:eDhIc2KyRt6QgC/0AG6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Actions looks like stealing of personal data

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
    • The process drops C-runtime libraries

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
    • Reads the Internet Settings

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • The process creates files with name similar to system file names

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Executable content was dropped or overwritten

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads the Windows owner or organization settings

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads security settings of Internet Explorer

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Checks Windows Trust Settings

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads settings of System Certificates

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Application launched itself

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
    • Searches for installed software

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Adds/modifies Windows certificates

      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Process requests binary or script from the Internet

      • Andy_47.260_1096_26_x64.exe (PID: 3244)
  • INFO

    • Reads the computer name

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Checks supported languages

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Create files in a temporary directory

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads the machine GUID from the registry

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads Environment values

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads product name

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Creates files or folders in the user directory

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:27 21:34:19+02:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 4186112
InitializedDataSize: 373248
UninitializedDataSize: -
EntryPoint: 0x3fffc6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileVersion: 1.0.0.0
ProductVersion: 1.0.0.0
Comments: -
CompanyName: Andy OS Inc.
FileDescription: Andy OS
InternalName: AR001.exe
LegalCopyright: Copyright © Adaware 2023
LegalTrademarks: -
OriginalFileName: GenericSetup.exe
ProductName: Andy OS
AssemblyVersion: 1.1.0.6578
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start andy_47.260_1096_26_x64.exe andy_47.260_1096_26_x64.exe

Process information

PID
CMD
Path
Indicators
Parent process
1380"C:\Users\admin\AppData\Local\Temp\Andy_47.260_1096_26_x64.exe" C:\Users\admin\AppData\Local\Temp\Andy_47.260_1096_26_x64.exe
explorer.exe
User:
admin
Company:
Andy OS Inc.
Integrity Level:
MEDIUM
Description:
Andy OS
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\andy_47.260_1096_26_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3244"C:\Users\admin\AppData\Local\Temp\Andy_47.260_1096_26_x64.exe" huac hpp=QzpcVXNlcnNcYWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXEFuZHlfNDcuMjYwXzEwOTZfMjZfeDY0LmV4ZQ==C:\Users\admin\AppData\Local\Temp\Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
User:
admin
Company:
Andy OS Inc.
Integrity Level:
HIGH
Description:
Andy OS
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\andy_47.260_1096_26_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
9 646
Read events
9 588
Write events
58
Delete events
0

Modification events

(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
20
Suspicious files
0
Text files
20
Unknown types
0

Dropped files

PID
Process
Filename
Type
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\Ninject.dllexecutable
MD5:8DB691813A26E7D0F1DB5E2F4D0D05E3
SHA256:3043A65F11AC204E65BCA142FF4166D85F1B22078B126B806F1FECB2A315C701
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2OModels.dllexecutable
MD5:E57646A871A04782FD546583A01D62B4
SHA256:F5138FE637E5B1B735FB2E54607147CEB973CC537AD07690EF1BCA27AC6DA4B5
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\vcruntime140.dllexecutable
MD5:1A84957B6E681FCA057160CD04E26B27
SHA256:9FAEAA45E8CC986AF56F28350B38238B03C01C355E9564B849604B8D690919C5
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2OUtilities.dllexecutable
MD5:DE46930143BFC9B30F0F68EF2317A320
SHA256:FE4942CF5B5FDFD04E6AF4CDAA128FBADD35B9A4C6D7D6B4407A02CE55131932
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\OfferSDK.dllexecutable
MD5:1105B8B33B0F019651566B87959512E2
SHA256:9A059883BEE5177723B1A971172010A349DB64C1DD60FCB3BBF190FE0E78BB07
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\ServiceHide.dllexecutable
MD5:26D7A9A819AD38801857D657DA7B43DA
SHA256:43BAD9C77F861C5CE0F622896A33DBD8C34157C004550CAC22CC97D3A4BA3052
3244Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Adaware\Andy_47.260_1096_26_x64.e_Url_t3zyyfnhbi0ltekns0wxxehohiocfftb\1.1.0.6578\xnrvhpkl.newcfgxml
MD5:C76D70D8440A273C2B2A2764F33323B8
SHA256:8F6658DFB498D9BC831670DFFD055D850D327A2DEFD82E1F24416316B037135D
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Adaware\Andy_47.260_1096_26_x64.e_Url_t3zyyfnhbi0ltekns0wxxehohiocfftb\1.1.0.6578\user.configxml
MD5:C76D70D8440A273C2B2A2764F33323B8
SHA256:8F6658DFB498D9BC831670DFFD055D850D327A2DEFD82E1F24416316B037135D
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\Newtonsoft.Json.dllexecutable
MD5:9DE86CDF74A30602D6BAA7AFFC8C4A0F
SHA256:56032ADE45CCF8F4C259A2E57487124CF448A90BCA2EEB430DA2722D9E109583
3244Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Adaware\Andy_47.260_1096_26_x64.e_Url_t3zyyfnhbi0ltekns0wxxehohiocfftb\1.1.0.6578\user.configxml
MD5:C76D70D8440A273C2B2A2764F33323B8
SHA256:8F6658DFB498D9BC831670DFFD055D850D327A2DEFD82E1F24416316B037135D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
19
DNS requests
11
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3244
Andy_47.260_1096_26_x64.exe
GET
54.82.151.110:80
http://dl.andyroid.net/andy_latest.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3244
Andy_47.260_1096_26_x64.exe
104.17.8.52:443
flow.lavasoft.com
CLOUDFLARENET
shared
3244
Andy_47.260_1096_26_x64.exe
104.18.68.73:443
sos.adaware.com
CLOUDFLARENET
unknown
3244
Andy_47.260_1096_26_x64.exe
104.21.31.55:443
cdn.supernovaprizes.com
CLOUDFLARENET
unknown
3244
Andy_47.260_1096_26_x64.exe
18.173.154.28:443
dl.vidconvert.io
US
unknown
3244
Andy_47.260_1096_26_x64.exe
18.66.192.22:443
anypdf.com
AMAZON-02
US
unknown
3244
Andy_47.260_1096_26_x64.exe
2.18.161.103:443
package.avira.com
AKAMAI-AS
DE
unknown
3244
Andy_47.260_1096_26_x64.exe
104.18.67.73:443
sos.adaware.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
www.google.com
  • 172.217.18.100
whitelisted
flow.lavasoft.com
  • 104.17.8.52
  • 104.17.9.52
whitelisted
sos.adaware.com
  • 104.18.68.73
  • 104.18.67.73
whitelisted
cdn.supernovaprizes.com
  • 104.21.31.55
  • 172.67.175.2
unknown
dl.vidconvert.io
  • 18.173.154.28
  • 18.173.154.34
  • 18.173.154.33
  • 18.173.154.19
unknown
anypdf.com
  • 18.66.192.22
  • 18.66.192.109
  • 18.66.192.18
  • 18.66.192.55
unknown
package.avira.com
  • 2.18.161.103
unknown
sdl.adaware.com
  • 104.18.67.73
  • 104.18.68.73
whitelisted
download.enigmasoftware.com
  • 18.245.86.74
  • 18.245.86.28
  • 18.245.86.53
  • 18.245.86.104
shared
spyhunter-download-v2.b-cdn.net
  • 169.150.247.38
unknown

Threats

PID
Process
Class
Message
3244
Andy_47.260_1096_26_x64.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
7 ETPRO signatures available at the full report
Process
Message
Andy_47.260_1096_26_x64.exe
Error: File not found - sciterwrapper:console.tis
Andy_47.260_1096_26_x64.exe
at sciter:init-script.tis
Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'
Andy_47.260_1096_26_x64.exe
at sciter:init-script.tis
Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'
Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
Error: File not found - sciterwrapper:console.tis