File name:

41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99

Full analysis: https://app.any.run/tasks/7bc0c6b5-8a1f-4f8d-80f8-190e77a81805
Verdict: Malicious activity
Threats:

zgRAT is a malware known for its ability to infect systems and exfiltrate sensitive data to command-and-control (C2) servers. It is primarily distributed through loader malware, as well as phishing emails. zgRAT employs various advanced techniques, including process injection and code obfuscation, to evade detection and maintain persistence on infected systems. The malware can also spread via USB drives and uses popular messaging platforms like Telegram and Discord for data exfiltration.

Analysis date: May 18, 2025, 18:03:32
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
netreactor
zgrat
api-base64
pureminer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

6C9F3E248382F389D17D308AD5350D6D

SHA1:

6CC9384106C4DF4B4285DC2E64C6433ACCD0F3E6

SHA256:

41BF286F78C2CB29F263C89DD069CBB2EC4FB2F4FAB12EA5C6DF42BD606CEA99

SSDEEP:

49152:97hHLIzW8FhcFwLd+I3ixZY0NgB62OAHTIeYNzlb9ScX6xH7m5k1RNJ7GX44Ps/K:9BkW8FLEK9B6cHTlY9l4oE7Lx7GXls/K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PUREMINER has been detected (YARA)

      • RegAsm.exe (PID: 4488)
    • [YARA] zgRAT detected by memory dumps

      • RegAsm.exe (PID: 4488)
  • SUSPICIOUS

    • Application launched itself

      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6620)
      • TypeId.exe (PID: 3192)
      • RegAsm.exe (PID: 6744)
    • Executable content was dropped or overwritten

      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6876)
    • The process executes via Task Scheduler

      • TypeId.exe (PID: 3192)
    • Connects to unusual port

      • RegAsm.exe (PID: 4488)
  • INFO

    • Reads the computer name

      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6876)
      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6620)
      • TypeId.exe (PID: 3192)
      • TypeId.exe (PID: 6436)
      • RegAsm.exe (PID: 6744)
      • RegAsm.exe (PID: 4488)
    • Checks supported languages

      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6620)
      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6876)
      • TypeId.exe (PID: 3192)
      • TypeId.exe (PID: 6436)
      • RegAsm.exe (PID: 6744)
      • RegAsm.exe (PID: 4488)
    • Reads the machine GUID from the registry

      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6620)
      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6876)
      • TypeId.exe (PID: 3192)
      • TypeId.exe (PID: 6436)
      • RegAsm.exe (PID: 6744)
      • RegAsm.exe (PID: 4488)
    • Creates files or folders in the user directory

      • 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe (PID: 6876)
    • .NET Reactor protector has been detected

      • RegAsm.exe (PID: 4488)
    • Potential remote process memory writing (Base64 Encoded 'WriteProcessMemory')

      • RegAsm.exe (PID: 4488)
    • Potential remote process memory interaction (Base64 Encoded 'VirtualAllocEx')

      • RegAsm.exe (PID: 4488)
    • Potential modification of remote process state (Base64 Encoded 'SetThreadContext')

      • RegAsm.exe (PID: 4488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2023:11:27 17:41:09+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 8
CodeSize: 934912
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0xe6246
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: Klkypmnqw.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: Klkypmnqw.exe
ProductName: -
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe no specs 41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe sppextcomobj.exe no specs slui.exe typeid.exe no specs typeid.exe no specs regasm.exe no specs #ZGRAT regasm.exe

Process information

PID
CMD
Path
Indicators
Parent process
3192"C:\Users\admin\AppData\Roaming\FallbackBuffer\TypeId.exe"C:\Users\admin\AppData\Roaming\FallbackBuffer\TypeId.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\fallbackbuffer\typeid.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4488C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
RegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4688"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6036C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6436C:\Users\admin\AppData\Roaming\FallbackBuffer\TypeId.exeC:\Users\admin\AppData\Roaming\FallbackBuffer\TypeId.exeTypeId.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\fallbackbuffer\typeid.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6620"C:\Users\admin\AppData\Local\Temp\41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe" C:\Users\admin\AppData\Local\Temp\41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6744C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeTypeId.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6876C:\Users\admin\AppData\Local\Temp\41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exeC:\Users\admin\AppData\Local\Temp\41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe
41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\41bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
1 383
Read events
1 383
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
687641bf286f78c2cb29f263c89dd069cbb2ec4fb2f4fab12ea5c6df42bd606cea99.exeC:\Users\admin\AppData\Roaming\FallbackBuffer\TypeId.exeexecutable
MD5:6C9F3E248382F389D17D308AD5350D6D
SHA256:41BF286F78C2CB29F263C89DD069CBB2EC4FB2F4FAB12EA5C6DF42BD606CEA99
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
25
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2772
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2104
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2772
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4024
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.176
  • 23.48.23.156
  • 23.48.23.147
  • 23.48.23.173
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 172.217.18.110
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.2
  • 40.126.31.131
  • 40.126.31.0
  • 40.126.31.2
  • 20.190.159.23
  • 20.190.159.73
  • 40.126.31.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info