download:

/loader.exe

Full analysis: https://app.any.run/tasks/ad9f1734-c075-4159-b47e-f3daae3a0873
Verdict: Malicious activity
Analysis date: March 31, 2025, 16:07:31
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 4 sections
MD5:

8FA4FBC14D91FFDFFB284DEC11D0E639

SHA1:

3B10B00AC89883DC2219EFFC2E44923D6B3B5233

SHA256:

3CBB9C06B3E217D273E30650650FF955983A7A9C3D6A3FAE7FB9FEA5EC839AEB

SSDEEP:

1536:fULaGp0b+IgEs2f0BVoz0xwlRN5Cc2+sWMbBrPGk5YkJom/1enyplwp:gIgEs2fQVSCc0rtxJoeQwC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 7932)
      • cmd.exe (PID: 7716)
    • Starts CMD.EXE for commands execution

      • loader.exe (PID: 7584)
      • cmd.exe (PID: 8108)
      • cmd.exe (PID: 7200)
      • loader.exe (PID: 8064)
      • cmd.exe (PID: 7608)
      • cmd.exe (PID: 5352)
      • cmd.exe (PID: 7232)
      • cmd.exe (PID: 2268)
      • cmd.exe (PID: 8092)
      • cmd.exe (PID: 960)
    • Executing commands from a ".bat" file

      • loader.exe (PID: 7584)
      • cmd.exe (PID: 8092)
      • loader.exe (PID: 8064)
      • cmd.exe (PID: 7608)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 8108)
      • cmd.exe (PID: 5352)
    • Application launched itself

      • cmd.exe (PID: 8108)
      • cmd.exe (PID: 7200)
      • cmd.exe (PID: 5352)
      • cmd.exe (PID: 7232)
      • cmd.exe (PID: 2268)
      • cmd.exe (PID: 960)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7200)
      • cmd.exe (PID: 8108)
      • cmd.exe (PID: 7232)
      • cmd.exe (PID: 2268)
      • cmd.exe (PID: 5352)
      • cmd.exe (PID: 960)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 8108)
    • Takes ownership (TAKEOWN.EXE)

      • cmd.exe (PID: 8108)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 8108)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 8108)
      • curl.exe (PID: 6044)
    • Get information on the list of running processes

      • cmd.exe (PID: 8108)
    • Connects to unusual port

      • curl.exe (PID: 8152)
      • curl.exe (PID: 7832)
      • curl.exe (PID: 1676)
      • curl.exe (PID: 5408)
      • curl.exe (PID: 4980)
      • curl.exe (PID: 7360)
      • curl.exe (PID: 5744)
    • Starts application with an unusual extension

      • cmd.exe (PID: 5352)
      • cmd.exe (PID: 8108)
    • Uses WMIC.EXE to obtain data on the base board management (motherboard or system board)

      • cmd.exe (PID: 1096)
      • cmd.exe (PID: 2236)
  • INFO

    • Starts MODE.COM to configure console settings

      • mode.com (PID: 7804)
      • mode.com (PID: 8140)
    • Reads the computer name

      • curl.exe (PID: 7260)
      • curl.exe (PID: 6044)
      • curl.exe (PID: 6032)
    • Checks supported languages

      • loader.exe (PID: 7584)
      • mode.com (PID: 7804)
      • curl.exe (PID: 6044)
      • curl.exe (PID: 7260)
      • mode.com (PID: 8140)
      • loader.exe (PID: 8064)
      • chcp.com (PID: 7872)
      • curl.exe (PID: 7832)
      • curl.exe (PID: 6032)
      • curl.exe (PID: 1676)
      • curl.exe (PID: 8152)
      • curl.exe (PID: 5408)
      • chcp.com (PID: 8132)
      • curl.exe (PID: 4980)
      • curl.exe (PID: 7360)
      • curl.exe (PID: 5744)
    • Creates a new folder

      • cmd.exe (PID: 7900)
      • cmd.exe (PID: 7876)
      • cmd.exe (PID: 7504)
      • cmd.exe (PID: 7564)
    • Create files in a temporary directory

      • loader.exe (PID: 7584)
      • curl.exe (PID: 7260)
      • curl.exe (PID: 6044)
      • loader.exe (PID: 8064)
      • curl.exe (PID: 6032)
    • Creates files or folders in the user directory

      • cmd.exe (PID: 8108)
      • cmd.exe (PID: 5352)
    • Manual execution by a user

      • loader.exe (PID: 7928)
      • loader.exe (PID: 8064)
    • Changes the display of characters in the console

      • cmd.exe (PID: 5352)
      • cmd.exe (PID: 8108)
    • Execution of CURL command

      • cmd.exe (PID: 5352)
      • cmd.exe (PID: 8108)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 6752)
      • WMIC.exe (PID: 8116)
    • Checks proxy server information

      • slui.exe (PID: 5392)
    • Reads the software policy settings

      • slui.exe (PID: 5392)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:04:22 18:25:23+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 57344
InitializedDataSize: 11550720
UninitializedDataSize: -
EntryPoint: 0x7f86
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
227
Monitored processes
91
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start loader.exe conhost.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs attrib.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe chcp.com no specs curl.exe timeout.exe no specs curl.exe svchost.exe cmd.exe no specs cmd.exe no specs findstr.exe no specs curl.exe tasklist.exe no specs findstr.exe no specs taskkill.exe no specs timeout.exe no specs takeown.exe no specs icacls.exe no specs timeout.exe no specs loader.exe no specs loader.exe conhost.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs attrib.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs chcp.com no specs curl.exe timeout.exe no specs curl.exe cmd.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs findstr.exe no specs timeout.exe no specs timeout.exe no specs cmd.exe no specs wmic.exe no specs curl.exe findstr.exe no specs timeout.exe no specs slui.exe cmd.exe no specs wmic.exe no specs curl.exe findstr.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs findstr.exe no specs timeout.exe no specs timeout.exe no specs curl.exe findstr.exe no specs findstr.exe no specs timeout.exe no specs timeout.exe no specs curl.exe findstr.exe no specs findstr.exe no specs timeout.exe no specs timeout.exe no specs curl.exe findstr.exe no specs findstr.exe no specs timeout.exe no specs timeout.exe no specs loader.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
616timeout /t 2 /nobreak C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
960C:\WINDOWS\system32\cmd.exe /c type logs\login.txt | findstr "user_id"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1020taskkill /F /IM loader.exe C:\Windows\System32\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1052timeout /t 3 /nobreak C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1096C:\WINDOWS\system32\cmd.exe /c wmic baseboard get serialnumber /valueC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1184tasklist C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1276"C:\Users\admin\Desktop\loader.exe" C:\Users\admin\Desktop\loader.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\loader.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1672timeout /t 1 /nobreak C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1676curl -s -X POST http://54.38.157.20:5000/create_account -H "Content-Type: application/json" -d "{\"username\":\"admin\", \"password\":\"admin\", \"hwid\":\"\"}" -o logs\account.txt C:\Windows\System32\curl.exe
cmd.exe
User:
admin
Company:
curl, https://curl.se/
Integrity Level:
HIGH
Description:
The curl executable
Exit code:
0
Version:
8.4.0
Modules
Images
c:\windows\system32\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\cryptsp.dll
1760findstr /C:"\"status\": \"success\"" logs\account.txt C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
Total events
3 772
Read events
3 772
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
3
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
7988cmd.exeC:\Users\admin\AppData\Local\Temp\i6.ttext
MD5:21438EF4B9AD4FC266B6129A2F60DE29
SHA256:13BF7B3039C63BF5A50491FA3CFD8EB4E699D1BA1436315AEF9CBE5711530354
1676curl.exeC:\Users\admin\Desktop\logs\account.txtbinary
MD5:0C1E7E331FF98F81D1DA7874942C8141
SHA256:77FB2073462B0ABA5EE8C449EC16680D0379096666084F43166CE53D590A67B5
5408curl.exeC:\Users\admin\Desktop\logs\login.txtbinary
MD5:ABD8EC47127D176FC1A88A79E73312EC
SHA256:0BC98BBC5FED0ADCED7C9D0EB60DF85702E04928E376BA3E3E46F57B18C6DB28
8108cmd.exeC:\Users\admin\Desktop\loader.exeexecutable
MD5:8FA4FBC14D91FFDFFB284DEC11D0E639
SHA256:3CBB9C06B3E217D273E30650650FF955983A7A9C3D6A3FAE7FB9FEA5EC839AEB
8008cmd.exeC:\Users\admin\AppData\Local\Temp\i6.ftext
MD5:FBB567216D6FA2A929F4FE2389740816
SHA256:D10A6587021A36C1AF3B558DE7D5BDE0C047D0C494454C1ED08B6A19BBCF842A
7584loader.exeC:\Users\admin\AppData\Local\Temp\wtmpd\tmp78824.battext
MD5:0DBB6BF004BA3B0B304963F097DD2F2F
SHA256:415232BC67C8426FFDBC34615FABE286CF1A07BE95DC024B6580589D7F4AED77
7584loader.exeC:\Users\admin\AppData\Local\Temp\i6.battext
MD5:1AF1AB0E1E623C11529763D3016C0818
SHA256:57F6713E8C793D5D81FBBF2E16DB7098B1D5A3A608915E62468F2435DAFBFD85
6044curl.exeC:\Users\admin\AppData\Local\Temp\loader_new.exeexecutable
MD5:8FA4FBC14D91FFDFFB284DEC11D0E639
SHA256:3CBB9C06B3E217D273E30650650FF955983A7A9C3D6A3FAE7FB9FEA5EC839AEB
7260curl.exeC:\Users\admin\AppData\Local\Temp\latest_version.txttext
MD5:73CCD957744DD2396F454D124D02080B
SHA256:24F502B1E3ABFA8EA2DB55A62DD09FD7BE591D415B91F82AF0CE90CD7A443063
8108cmd.exeC:\Users\admin\AppData\Roaming\Loader\loader.versiontext
MD5:4B16787399FC055BBC81614EF2BDB8A1
SHA256:FFB3AE2D3BDC8B530F9732FE7A6443422527347E7A12949D28A1175377F8DE63
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
33
DNS requests
23
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5780
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
5780
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
8152
curl.exe
GET
200
54.38.157.20:5000
http://54.38.157.20:5000/status
unknown
unknown
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
756
lsass.exe
GET
200
23.209.213.129:80
http://x1.c.lencr.org/
unknown
whitelisted
756
lsass.exe
GET
200
2.19.120.133:80
http://e6.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBTUejiAQejpjQc4fOz2ttjyD6VkMQQUDcXM%2FZvuFAWhTDCCpT5eisNYCdICEgU5ncLLotvVuAz3YjJe2GmmKg%3D%3D
unknown
whitelisted
7836
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7836
SIHClient.exe
GET
200
23.209.214.100:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7832
curl.exe
GET
200
54.38.157.20:5000
http://54.38.157.20:5000/status
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4244
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
3216
svchost.exe
20.7.1.246:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5780
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
8152
curl.exe
54.38.157.20:5000
cdn.echostore.cc
OVH SAS
DE
unknown
6544
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7260
curl.exe
54.38.157.20:443
cdn.echostore.cc
OVH SAS
DE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
client.wns.windows.com
  • 20.7.1.246
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 23.215.0.133
  • 96.7.128.192
  • 96.7.128.186
  • 23.215.0.132
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
login.live.com
  • 20.190.160.130
  • 20.190.160.64
  • 20.190.160.66
  • 20.190.160.3
  • 40.126.32.136
  • 20.190.160.67
  • 20.190.160.20
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted

Threats

PID
Process
Class
Message
8152
curl.exe
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
7832
curl.exe
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
1676
curl.exe
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
5408
curl.exe
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
4980
curl.exe
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
7360
curl.exe
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
5744
curl.exe
Potentially Bad Traffic
ET HUNTING curl User-Agent to Dotted Quad
No debug info