File name:

4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f

Full analysis: https://app.any.run/tasks/846b5743-a7d4-4e21-9ca4-2caa757a0283
Verdict: Malicious activity
Threats:

Stealc is a stealer malware that targets victims’ sensitive data, which it exfiltrates from browsers, messaging apps, and other software. The malware is equipped with advanced features, including fingerprinting, control panel, evasion mechanisms, string obfuscation, etc. Stealc establishes persistence and communicates with its C2 server through HTTP POST requests.

Analysis date: May 18, 2025, 14:33:59
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealc
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

E5DBE60DBE305D5B512A93C80F2575AD

SHA1:

4C06866FE7A04FD5B691C59D5A7376AF574D7E0E

SHA256:

4141832DA8CB4C2CB699E490A67C16F8223B0DBDB0FC48632D9F999E19B87A8F

SSDEEP:

6144:9CSiYU/Tx9DqkwFVzIJY3H4AHtNO6mY4K9opgXGh/d8wqjiVVVVV:9EYUfsVzAgBoxqjiVVVVV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • STEALC has been detected

      • 4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe (PID: 3884)
    • STEALC mutex has been found

      • 4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe (PID: 3884)
  • SUSPICIOUS

    • Windows Defender mutex has been found

      • 4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe (PID: 3884)
    • Executes application which crashes

      • 4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe (PID: 3884)
  • INFO

    • Checks supported languages

      • 4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe (PID: 3884)
    • Reads the computer name

      • 4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe (PID: 3884)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 2552)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (72.3)
.exe | Win32 Executable (generic) (11.8)
.exe | Clipper DOS Executable (5.2)
.exe | Generic Win/DOS Executable (5.2)
.exe | DOS Executable Generic (5.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:07:06 13:08:08+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 151552
InitializedDataSize: 40477184
UninitializedDataSize: -
EntryPoint: 0x3449
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 37.0.0.0
ProductVersionNumber: 46.0.0.0
FileFlagsMask: 0x145a
FileFlags: (none)
FileOS: Unknown (0x20723)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Unknown (0452)
CharacterSet: Unknown (30F3)
FileDescription: Malling
LegalCopyright: Copyright (C) 2022, Crazy
OriginalFileName: Jungle
ProductsVersion: 57.5.29.90
ProductionVersion: 47.50.29.96
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #STEALC 4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe sppextcomobj.exe no specs slui.exe no specs werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
664C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2552C:\WINDOWS\SysWOW64\WerFault.exe -u -p 3884 -s 544C:\Windows\SysWOW64\WerFault.exe4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
3884"C:\Users\admin\AppData\Local\Temp\4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe" C:\Users\admin\AppData\Local\Temp\4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4448"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 767
Read events
1 767
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2552WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_4141832da8cb4c2c_d7463f338b514cc7ed353595d5a8fd6e438789ba_c74622ca_9e40977d-9857-48a0-9041-b00b2e7e1d45\Report.wer
MD5:
SHA256:
2552WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA42D.tmp.WERInternalMetadata.xmlbinary
MD5:49F87147683F2FD56AC12839257402A4
SHA256:01AF537EFBFA76CAF4756A21C84734FB371417E35925E2C200AD39C462F2A36C
2552WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\4141832da8cb4c2cb699e490a67c16f8223b0dbdb0fc48632d9f999e19b87a8f.exe.3884.dmpbinary
MD5:CC8C61F9AA4668F1375903C1A8296DA8
SHA256:2699BCB36B079990720CFC9363B8D9F099A134D1CCBFB33BC1141F2DCEF46F7F
2552WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA3A0.tmp.dmpbinary
MD5:873E5D99BC7826FF6273EF76C1394AC9
SHA256:7E056A9146958FFC45810B4DDE6DB6B8F7E1CCC707DE1E844B5E1C521D6E65DA
2552WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA45D.tmp.xmlxml
MD5:7316FB7ED5B70560434C009A4B8F6485
SHA256:BEABB035632944340E2EB67D1EEF1366FE52FD9EC5293930C426917B4086945B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1180
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1180
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.128
  • 20.190.159.130
  • 20.190.159.131
  • 40.126.31.128
  • 40.126.31.131
  • 20.190.159.64
  • 40.126.31.3
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info