File name:

random(2).exe

Full analysis: https://app.any.run/tasks/efb869cc-6e03-422c-bb41-b58777a28087
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 25, 2025, 04:57:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
telegram
vidar
stealer
themida
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

67F22216A832C20B0AB73D584FA988CC

SHA1:

66B2AF647469CB950F95967FBC690E9E97761DAD

SHA256:

3E96595FD8DDA0749679A56D3B2563722D7A9BE2173DE575C5931FB52A7C26CE

SSDEEP:

98304:kr8Bgb25I3jcFhS3RVxrqj3+RhbN8G6AHzUEmPCrZvfQhSKAUAq/kCqp0edWN2k1:VFK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • VIDAR mutex has been found

      • random(2).exe (PID: 496)
    • VIDAR has been detected (YARA)

      • random(2).exe (PID: 496)
    • Actions looks like stealing of personal data

      • random(2).exe (PID: 496)
    • Steals credentials from Web Browsers

      • random(2).exe (PID: 496)
  • SUSPICIOUS

    • Reads the BIOS version

      • random(2).exe (PID: 496)
    • Reads security settings of Internet Explorer

      • random(2).exe (PID: 496)
    • Searches for installed software

      • random(2).exe (PID: 496)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • random(2).exe (PID: 496)
    • Multiple wallet extension IDs have been found

      • random(2).exe (PID: 496)
  • INFO

    • Reads the computer name

      • random(2).exe (PID: 496)
    • Checks proxy server information

      • random(2).exe (PID: 496)
    • Checks supported languages

      • random(2).exe (PID: 496)
    • Creates files in the program directory

      • random(2).exe (PID: 496)
    • Creates files or folders in the user directory

      • random(2).exe (PID: 496)
    • Reads the software policy settings

      • random(2).exe (PID: 496)
      • slui.exe (PID: 7404)
    • Reads product name

      • random(2).exe (PID: 496)
    • Reads the machine GUID from the registry

      • random(2).exe (PID: 496)
    • Reads Environment values

      • random(2).exe (PID: 496)
    • Reads CPU info

      • random(2).exe (PID: 496)
    • Themida protector has been detected

      • random(2).exe (PID: 496)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Vidar

(PID) Process(496) random(2).exe
C2https://t.me/g_etcontent
URLhttps://steamcommunity.com/profiles/76561199832267488
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:02:24 04:48:01+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 115200
InitializedDataSize: 25600
UninitializedDataSize: -
EntryPoint: 0x468000
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #VIDAR random(2).exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
496"C:\Users\admin\AppData\Local\Temp\random(2).exe" C:\Users\admin\AppData\Local\Temp\random(2).exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\random(2).exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Vidar
(PID) Process(496) random(2).exe
C2https://t.me/g_etcontent
URLhttps://steamcommunity.com/profiles/76561199832267488
4920C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7372C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7404"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 243
Read events
1 240
Write events
3
Delete events
0

Modification events

(PID) Process:(496) random(2).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(496) random(2).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(496) random(2).exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
4
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
496random(2).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\30D06251F7C6A9D0C4F29F820ED31672_0F7B4491147C58295D9A4AF1D2C18FC6binary
MD5:B83905A51346C245BBD0750EB7BEA0D2
SHA256:BA1050A67DEC72C528DE198108AF661AFBEF502BA1696D6900F717563A3138CB
496random(2).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:2E98DDE300AA809B98F65EEA7C344EE7
SHA256:79797F058B13C66A10338CDFD1B376C7BD46C46CB8BAFCAD79EED61FB0AAE0CE
496random(2).exeC:\ProgramData\sjmg4\jwt26xtext
MD5:2C99A16AED3906D92FFE3EF1808E2753
SHA256:08412578CC3BB4922388F8FF8C23962F616B69A1588DA720ADE429129C73C452
496random(2).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\30D06251F7C6A9D0C4F29F820ED31672_0F7B4491147C58295D9A4AF1D2C18FC6binary
MD5:E4ED1B5BDA92D91493F5A0306D04F248
SHA256:D67548BED258DF6DBC11C96B73ACBB141414B0D0D90B3EBF0C5204E8BC97179B
496random(2).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751binary
MD5:E192462F281446B5D1500D474FBACC4B
SHA256:F1BA9F1B63C447682EBF9DE956D0DA2A027B1B779ABEF9522D347D3479139A60
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
37
DNS requests
19
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
2104
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
496
random(2).exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
unknown
496
random(2).exe
GET
200
184.24.77.48:80
http://e5.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQeEcDJrP2kU%2B9LL2pzIRVgTVStuQQUmc0pw6FYJq96ekyEWo9ziGCw394CEgZh1pQRGYA1ofW59bBE13fPVg%3D%3D
unknown
unknown
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
7204
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
7204
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
7308
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4
System
192.168.100.255:138
unknown
5496
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
2104
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5496
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
496
random(2).exe
149.154.167.99:443
t.me
Telegram Messenger Inc
GB
unknown
496
random(2).exe
167.235.59.196:443
h.p.formaxprime.co.uk
Hetzner Online GmbH
DE
unknown
496
random(2).exe
69.192.161.44:80
x1.c.lencr.org
AKAMAI-AS
DE
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.238
unknown
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
unknown
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
unknown
t.me
  • 149.154.167.99
unknown
h.p.formaxprime.co.uk
  • 167.235.59.196
unknown
x1.c.lencr.org
  • 69.192.161.44
unknown
e5.o.lencr.org
  • 184.24.77.48
  • 184.24.77.54
unknown
client.wns.windows.com
  • 40.115.3.253
unknown
login.live.com
  • 20.190.160.2
  • 20.190.160.128
  • 40.126.32.136
  • 40.126.32.138
  • 20.190.160.22
  • 40.126.32.68
  • 40.126.32.140
  • 20.190.160.132
unknown
ocsp.digicert.com
  • 184.30.131.245
unknown

Threats

PID
Process
Class
Message
496
random(2).exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
No debug info