File name:

SumatraPDF-3.5.2-64-install.exe

Full analysis: https://app.any.run/tasks/4fc988c1-80b4-4dd0-98ee-338121dbd468
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: August 26, 2024, 04:36:24
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

D3269F0F422D36F24E62BD30AE722BFD

SHA1:

A700ECAB3628239A7C2831B4F74487419D9AA850

SHA256:

2BE4A27B83830EA07C6671C3557673D509544E5F70FC6B2DC8CC4388B302C1F2

SSDEEP:

98304:3mbOnSsrr4h9sHMnF3XTVj5BTwioQy2nUiCFcJzXqnMZu70ho/7qx2bxt6Vng3sz:/4h9sHo2cFpvSJWv6SNlt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • SumatraPDF.exe (PID: 7032)
  • SUSPICIOUS

    • Creates a software uninstall entry

      • SumatraPDF-3.5.2-64-install.exe (PID: 6680)
    • Drops the executable file immediately after the start

      • SumatraPDF-3.5.2-64-install.exe (PID: 6680)
    • Executable content was dropped or overwritten

      • SumatraPDF-3.5.2-64-install.exe (PID: 6680)
    • Explorer used for Indirect Command Execution

      • explorer.exe (PID: 6956)
    • Searches for installed software

      • SumatraPDF.exe (PID: 7032)
    • Reads security settings of Internet Explorer

      • SumatraPDF.exe (PID: 7032)
  • INFO

    • Checks supported languages

      • SumatraPDF-3.5.2-64-install.exe (PID: 6680)
      • SumatraPDF.exe (PID: 7032)
    • Creates files or folders in the user directory

      • SumatraPDF-3.5.2-64-install.exe (PID: 6680)
      • SumatraPDF.exe (PID: 7032)
    • Reads CPU info

      • SumatraPDF-3.5.2-64-install.exe (PID: 6680)
      • SumatraPDF.exe (PID: 7032)
    • Reads the computer name

      • SumatraPDF-3.5.2-64-install.exe (PID: 6680)
      • SumatraPDF.exe (PID: 7032)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 6992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:10:25 08:17:48+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.37
CodeSize: 1192960
InitializedDataSize: 7072256
UninitializedDataSize: -
EntryPoint: 0xeb990
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 3.5.2.0
ProductVersionNumber: 3.5.2.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileDescription: SumatraPDF
FileVersion: 3.5.2
LegalCopyright: Copyright 2006-2022 all authors (GPLv3)
ProductName: SumatraPDF
ProductVersion: 3.5.2
CompanyName: Krzysztof Kowalczyk
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
4
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start sumatrapdf-3.5.2-64-install.exe explorer.exe no specs explorer.exe no specs sumatrapdf.exe

Process information

PID
CMD
Path
Indicators
Parent process
6680"C:\Users\admin\Desktop\SumatraPDF-3.5.2-64-install.exe" C:\Users\admin\Desktop\SumatraPDF-3.5.2-64-install.exe
explorer.exe
User:
admin
Company:
Krzysztof Kowalczyk
Integrity Level:
MEDIUM
Description:
SumatraPDF
Exit code:
0
Version:
3.5.2
Modules
Images
c:\users\admin\desktop\sumatrapdf-3.5.2-64-install.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6956"C:\WINDOWS\explorer.exe" "C:\Users\admin\AppData\Local\SumatraPDF\SumatraPDF.exe"C:\Windows\explorer.exeSumatraPDF-3.5.2-64-install.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\twinapi.dll
6992C:\WINDOWS\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
7032"C:\Users\admin\AppData\Local\SumatraPDF\SumatraPDF.exe" C:\Users\admin\AppData\Local\SumatraPDF\SumatraPDF.exe
explorer.exe
User:
admin
Company:
Krzysztof Kowalczyk
Integrity Level:
MEDIUM
Description:
SumatraPDF
Version:
3.5.2
Modules
Images
c:\users\admin\appdata\local\sumatrapdf\sumatrapdf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.3636_none_60b6a03d71f818d5\comctl32.dll
Total events
15 962
Read events
15 623
Write events
310
Delete events
29

Modification events

(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:GlobalAssocChangedCounter
Value:
93
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.pdf\OpenWithProgids
Operation:delete valueName:SumatraPDF
Value:
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.pdf\OpenWithProgids
Operation:delete keyName:(default)
Value:
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.pdf
Operation:delete keyName:(default)
Value:
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.xps
Operation:delete keyName:(default)
Value:
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.epub\OpenWithProgids
Operation:delete valueName:SumatraPDF
Value:
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.epub\OpenWithProgids
Operation:delete keyName:(default)
Value:
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.epub
Operation:delete keyName:(default)
Value:
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.tif\OpenWithProgids
Operation:delete valueName:SumatraPDF
Value:
(PID) Process:(6680) SumatraPDF-3.5.2-64-install.exeKey:HKEY_CLASSES_ROOT\.tiff\OpenWithProgids
Operation:delete valueName:SumatraPDF
Value:
Executable files
4
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6680SumatraPDF-3.5.2-64-install.exeC:\Users\admin\AppData\Local\SumatraPDF\SumatraPDF.exeexecutable
MD5:D3269F0F422D36F24E62BD30AE722BFD
SHA256:2BE4A27B83830EA07C6671C3557673D509544E5F70FC6B2DC8CC4388B302C1F2
6680SumatraPDF-3.5.2-64-install.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\SumatraPDF.lnklnk
MD5:F3FB7EBE3404764BB1EF812271B81FDD
SHA256:CFBC8596C24BAAF3FF9272B29F1E459845D1F8699A469FF3C7A1DCEEAD93DBA2
6680SumatraPDF-3.5.2-64-install.exeC:\Users\admin\AppData\Local\SumatraPDF\PdfFilter.dllexecutable
MD5:4B0BFCA0BFE30ED332563E79A543ED01
SHA256:146A5D51283A0E6B43D6AC40C66EB9DF53C9BF9149B52D701C4F9C721123D925
6680SumatraPDF-3.5.2-64-install.exeC:\Users\admin\Desktop\SumatraPDF.lnkbinary
MD5:5E7739234B60838E8063CD778363B5B5
SHA256:DFE0F8836DBA1C44F0EB3A47143A050F179F2E9A67762F45BD4B667D01DBAF73
6680SumatraPDF-3.5.2-64-install.exeC:\Users\admin\AppData\Local\SumatraPDF\libmupdf.dllexecutable
MD5:2989996C4C89A17B6F35474C280A24FA
SHA256:178784BD40FFC21A8E7112F68949880CFA53AD3A6DE3B5AB6888BC8F569C6A4A
6680SumatraPDF-3.5.2-64-install.exeC:\Users\admin\AppData\Local\SumatraPDF\PdfPreview.dllexecutable
MD5:3D10C29D30CE8F7E32D4B935E841F5F8
SHA256:DD9CECB08558949E75D3EB147777C0B58EAC8A691755293C33D6E7016F4DD173
7032SumatraPDF.exeC:\Users\admin\AppData\Local\SumatraPDF\SumatraPDF-settings.txttext
MD5:8499D8CC3C5D8ABA04F6EBE478F7A35D
SHA256:452852D898572A91D57B6FD77291F56423614EBE1209ABB36F519EF1077A6C33
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
21
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2384
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6148
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3180
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2180
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2384
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2384
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 216.58.212.174
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.160.22
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.74
  • 40.126.32.136
  • 40.126.32.140
  • 40.126.32.134
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.166.126.56
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted

Threats

No threats detected
No debug info