File name:

Andy_47.260_1096_26_x64.exe

Full analysis: https://app.any.run/tasks/2d99ddd3-bca3-4415-a668-5503fbb22dc0
Verdict: Malicious activity
Analysis date: February 04, 2024, 10:49:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

00F93A78B4E447C8D80E588878B8D99E

SHA1:

AC1508D0DE07079ACC7A12FC45885456305766B2

SHA256:

270453AADA7A064E133890794E84270599723B3BFA0121104ABDAD1A79A13B7B

SSDEEP:

98304:wFlT8qeEpbDZ+JC2HzGXRbGlAwt6QgCqlJCN+GL0AG+G/s:eDhIc2KyRt6QgC/0AG6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Actions looks like stealing of personal data

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
    • The process drops C-runtime libraries

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
    • The process creates files with name similar to system file names

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads the Internet Settings

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Executable content was dropped or overwritten

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads the Windows owner or organization settings

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads security settings of Internet Explorer

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads settings of System Certificates

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Searches for installed software

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Application launched itself

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
    • Checks Windows Trust Settings

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Adds/modifies Windows certificates

      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Process requests binary or script from the Internet

      • Andy_47.260_1096_26_x64.exe (PID: 3244)
  • INFO

    • Reads the computer name

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Checks supported languages

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Create files in a temporary directory

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads the machine GUID from the registry

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads Environment values

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Reads product name

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
    • Creates files or folders in the user directory

      • Andy_47.260_1096_26_x64.exe (PID: 1380)
      • Andy_47.260_1096_26_x64.exe (PID: 3244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:27 21:34:19+02:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 4186112
InitializedDataSize: 373248
UninitializedDataSize: -
EntryPoint: 0x3fffc6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileVersion: 1.0.0.0
ProductVersion: 1.0.0.0
Comments: -
CompanyName: Andy OS Inc.
FileDescription: Andy OS
InternalName: AR001.exe
LegalCopyright: Copyright © Adaware 2023
LegalTrademarks: -
OriginalFileName: GenericSetup.exe
ProductName: Andy OS
AssemblyVersion: 1.1.0.6578
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start andy_47.260_1096_26_x64.exe andy_47.260_1096_26_x64.exe

Process information

PID
CMD
Path
Indicators
Parent process
1380"C:\Users\admin\AppData\Local\Temp\Andy_47.260_1096_26_x64.exe" C:\Users\admin\AppData\Local\Temp\Andy_47.260_1096_26_x64.exe
explorer.exe
User:
admin
Company:
Andy OS Inc.
Integrity Level:
MEDIUM
Description:
Andy OS
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\andy_47.260_1096_26_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3244"C:\Users\admin\AppData\Local\Temp\Andy_47.260_1096_26_x64.exe" huac hpp=QzpcVXNlcnNcYWRtaW5cQXBwRGF0YVxMb2NhbFxUZW1wXEFuZHlfNDcuMjYwXzEwOTZfMjZfeDY0LmV4ZQ==C:\Users\admin\AppData\Local\Temp\Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
User:
admin
Company:
Andy OS Inc.
Integrity Level:
HIGH
Description:
Andy OS
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\andy_47.260_1096_26_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
9 646
Read events
9 588
Write events
58
Delete events
0

Modification events

(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1380) Andy_47.260_1096_26_x64.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3244) Andy_47.260_1096_26_x64.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
20
Suspicious files
0
Text files
20
Unknown types
0

Dropped files

PID
Process
Filename
Type
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2ODAL.dllexecutable
MD5:D7134E64BDCE2EA5FA7504781A57ADAA
SHA256:F28041AB9EDB612DA9E7C42BB4D940E69FB440D4CB786F969512E0B61E54E637
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\Ninject.dllexecutable
MD5:8DB691813A26E7D0F1DB5E2F4D0D05E3
SHA256:3043A65F11AC204E65BCA142FF4166D85F1B22078B126B806F1FECB2A315C701
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\SciterWrapper.dllexecutable
MD5:6CBC4475B6AF8A6F68ED8696DF09FF2D
SHA256:51E42FF1D66F3042E512BE1DD60AC1C7B1A2A5307ACD191DFFCF24EF106C8970
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\msvcp140.dllexecutable
MD5:8FF1898897F3F4391803C7253366A87B
SHA256:51398691FEEF7AE0A876B523AEC47C4A06D9A1EE62F1A0AEE27DE6D6191C68AD
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2OServices.dllexecutable
MD5:046EDD0EE8296E611920786C4F25CD7A
SHA256:EED0EABB8ECBF5D30ABC0ED992F2EC2F28FA2E7D5588A090D357AF424A4DDD84
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2OUtilities.dllexecutable
MD5:DE46930143BFC9B30F0F68EF2317A320
SHA256:FE4942CF5B5FDFD04E6AF4CDAA128FBADD35B9A4C6D7D6B4407A02CE55131932
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\OfferSDK.dllexecutable
MD5:1105B8B33B0F019651566B87959512E2
SHA256:9A059883BEE5177723B1A971172010A349DB64C1DD60FCB3BBF190FE0E78BB07
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\H2OViewModels.dllexecutable
MD5:0EF343471A5777B6F90D9AE85164449E
SHA256:295B970CD45CA0D9577D5CE875DE5CF92367FCB6C7794E525B00090FA1AD62D6
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\HtmlAgilityPack.dllexecutable
MD5:17220F65BD242B6A491423D5BB7940C1
SHA256:23056F14EDB6E0AFC70224D65DE272A710B5D26E6C3B9FE2DFD022073050C59F
1380Andy_47.260_1096_26_x64.exeC:\Users\admin\AppData\Local\Temp\3354215998cc498efdf76f123473fe62\ServiceHide.dllexecutable
MD5:26D7A9A819AD38801857D657DA7B43DA
SHA256:43BAD9C77F861C5CE0F622896A33DBD8C34157C004550CAC22CC97D3A4BA3052
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
19
DNS requests
11
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3244
Andy_47.260_1096_26_x64.exe
GET
54.82.151.110:80
http://dl.andyroid.net/andy_latest.exe
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3244
Andy_47.260_1096_26_x64.exe
104.17.8.52:443
flow.lavasoft.com
CLOUDFLARENET
shared
3244
Andy_47.260_1096_26_x64.exe
104.18.68.73:443
sos.adaware.com
CLOUDFLARENET
unknown
3244
Andy_47.260_1096_26_x64.exe
104.21.31.55:443
cdn.supernovaprizes.com
CLOUDFLARENET
unknown
3244
Andy_47.260_1096_26_x64.exe
18.173.154.28:443
dl.vidconvert.io
US
unknown
3244
Andy_47.260_1096_26_x64.exe
18.66.192.22:443
anypdf.com
AMAZON-02
US
unknown
3244
Andy_47.260_1096_26_x64.exe
2.18.161.103:443
package.avira.com
AKAMAI-AS
DE
unknown
3244
Andy_47.260_1096_26_x64.exe
104.18.67.73:443
sos.adaware.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
www.google.com
  • 172.217.18.100
whitelisted
flow.lavasoft.com
  • 104.17.8.52
  • 104.17.9.52
whitelisted
sos.adaware.com
  • 104.18.68.73
  • 104.18.67.73
whitelisted
cdn.supernovaprizes.com
  • 104.21.31.55
  • 172.67.175.2
unknown
dl.vidconvert.io
  • 18.173.154.28
  • 18.173.154.34
  • 18.173.154.33
  • 18.173.154.19
unknown
anypdf.com
  • 18.66.192.22
  • 18.66.192.109
  • 18.66.192.18
  • 18.66.192.55
unknown
package.avira.com
  • 2.18.161.103
unknown
sdl.adaware.com
  • 104.18.67.73
  • 104.18.68.73
whitelisted
download.enigmasoftware.com
  • 18.245.86.74
  • 18.245.86.28
  • 18.245.86.53
  • 18.245.86.104
shared
spyhunter-download-v2.b-cdn.net
  • 169.150.247.38
unknown

Threats

PID
Process
Class
Message
3244
Andy_47.260_1096_26_x64.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
7 ETPRO signatures available at the full report
Process
Message
Andy_47.260_1096_26_x64.exe
Error: File not found - sciterwrapper:console.tis
Andy_47.260_1096_26_x64.exe
at sciter:init-script.tis
Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'
Andy_47.260_1096_26_x64.exe
at sciter:init-script.tis
Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'
Andy_47.260_1096_26_x64.exe
Andy_47.260_1096_26_x64.exe
Error: File not found - sciterwrapper:console.tis