File name:

reshacker_setup.exe

Full analysis: https://app.any.run/tasks/a51711f2-ee33-4137-aa4f-c9f643ae7269
Verdict: Malicious activity
Analysis date: February 11, 2024, 19:10:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C2734FF00DA8A35A8319F6D4EE3E07D3

SHA1:

DF3D047CE866E17852286044C099E0675034B534

SHA256:

46431DDF68FD664B0F58DFB1625A52936AF3BA48EE340CC05D89346024DD6601

SSDEEP:

98304:hKRjZAp7hM1K0EW2juaWYKRb8+WKtmkssyjPfwBnc8W8mQwoWEzCI4uIX9jcDujO:zxRFI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • runas.exe (PID: 3864)
      • reshacker_setup.exe (PID: 3732)
      • reshacker_setup.tmp (PID: 3216)
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • reshacker_setup.tmp (PID: 3216)
    • Executable content was dropped or overwritten

      • reshacker_setup.exe (PID: 3732)
      • reshacker_setup.tmp (PID: 3216)
    • Start notepad (likely ransomware note)

      • reshacker_setup.tmp (PID: 3216)
    • Reads the Internet Settings

      • ResourceHacker.exe (PID: 1492)
    • Reads the date of Windows installation

      • ResourceHacker.exe (PID: 1492)
    • Loads DLL from Mozilla Firefox

      • ResourceHacker.exe (PID: 1492)
  • INFO

    • Checks supported languages

      • reshacker_setup.tmp (PID: 3216)
      • reshacker_setup.exe (PID: 3732)
      • ResourceHacker.exe (PID: 1492)
    • Reads the computer name

      • reshacker_setup.tmp (PID: 3216)
      • ResourceHacker.exe (PID: 1492)
    • Creates files in the program directory

      • reshacker_setup.tmp (PID: 3216)
      • ResourceHacker.exe (PID: 1492)
    • Manual execution by a user

      • ResourceHacker.exe (PID: 1492)
      • rundll32.exe (PID: 2896)
      • notepad++.exe (PID: 848)
    • Creates a software uninstall entry

      • reshacker_setup.tmp (PID: 3216)
    • Reads the machine GUID from the registry

      • ResourceHacker.exe (PID: 1492)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (81.5)
.exe | Win32 Executable Delphi generic (10.5)
.exe | Win32 Executable (generic) (3.3)
.exe | Win16/32 Executable Delphi generic (1.5)
.exe | Generic Win/DOS Executable (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 41472
InitializedDataSize: 105472
UninitializedDataSize: -
EntryPoint: 0xaa98
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Resource Hacker Setup
FileVersion:
LegalCopyright: Copyright © 1998 - 2019 Angus Johnson.
ProductName: Resource Hacker
ProductVersion:
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
46
Monitored processes
7
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start runas.exe no specs reshacker_setup.exe reshacker_setup.tmp notepad.exe no specs resourcehacker.exe no specs rundll32.exe no specs notepad++.exe

Process information

PID
CMD
Path
Indicators
Parent process
848"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\fff.res"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.91
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1492"C:\Program Files\Resource Hacker\ResourceHacker.exe" C:\Program Files\Resource Hacker\ResourceHacker.exeexplorer.exe
User:
admin
Company:
Angus Johnson
Integrity Level:
MEDIUM
Description:
Resource viewer, decompiler & recompiler
Exit code:
0
Version:
5.1.7.343
Modules
Images
c:\program files\resource hacker\resourcehacker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2840"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\Resource Hacker\ReadMe.txtC:\Windows\System32\notepad.exereshacker_setup.tmp
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2896"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\fff.resC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3216"C:\Users\ADMINI~1\AppData\Local\Temp\is-F2768.tmp\reshacker_setup.tmp" /SL5="$E0214,2649214,147968,C:\Users\admin\Downloads\reshacker_setup.exe" C:\Users\Administrator\AppData\Local\Temp\is-F2768.tmp\reshacker_setup.tmp
reshacker_setup.exe
User:
Administrator
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\administrator\appdata\local\temp\is-f2768.tmp\reshacker_setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3732C:\Users\admin\Downloads\reshacker_setup.exeC:\Users\admin\Downloads\reshacker_setup.exe
runas.exe
User:
Administrator
Company:
Integrity Level:
HIGH
Description:
Resource Hacker Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\downloads\reshacker_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3864"C:\Windows\System32\runas.exe" /user:administrator C:\Users\admin\Downloads\reshacker_setup.exeC:\Windows\System32\runas.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Run As Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runas.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
Total events
14 662
Read events
14 015
Write events
565
Delete events
82

Modification events

(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
900C0000A49158F71D5DDA01
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
11A02E5AE0DEBB4AB75C124BDE5DB983615659BE774D5969DEE4EFDEB91FC99A
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:RegFiles0000
Value:
C:\Program Files\Resource Hacker\ResourceHacker.exe
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:RegFilesHash
Value:
1EE8F21520CE73E6A7FA8E046A21856CD0B9643110EADDEAA998A8D5C42BE315
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ResourceHacker_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.5.9 (a)
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ResourceHacker_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files\Resource Hacker
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ResourceHacker_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files\Resource Hacker\
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ResourceHacker_is1
Operation:writeName:Inno Setup: Icon Group
Value:
Resource Hacker
(PID) Process:(3216) reshacker_setup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ResourceHacker_is1
Operation:writeName:Inno Setup: User
Value:
Administrator
Executable files
8
Suspicious files
4
Text files
34
Unknown types
0

Dropped files

PID
Process
Filename
Type
3732reshacker_setup.exeC:\Users\ADMINI~1\AppData\Local\Temp\is-F2768.tmp\reshacker_setup.tmpexecutable
MD5:B79A2206D89578B1CD9914FE81190465
SHA256:3AE222DC93DBDBECD739E70CFBACE66BD8B42228D93B48BDD3D3F5B2747E755A
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\unins000.exeexecutable
MD5:C03332CF42786FD312E13E3B901D3F2A
SHA256:4836B10877D86FA87FAC91EE9E6D02CCBFF4DCF8B1FAB68367E9698F8B7AA46B
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\is-8B95Q.tmpexecutable
MD5:C03332CF42786FD312E13E3B901D3F2A
SHA256:4836B10877D86FA87FAC91EE9E6D02CCBFF4DCF8B1FAB68367E9698F8B7AA46B
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\is-0H67O.tmpexecutable
MD5:1126825F25C71AFC621EC89D2B026240
SHA256:4B255534D59E984E8B87827BE6EF7EFE1E218301FF9EC81F8B3D750BB0951A99
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\ResourceHacker.exeexecutable
MD5:1126825F25C71AFC621EC89D2B026240
SHA256:4B255534D59E984E8B87827BE6EF7EFE1E218301FF9EC81F8B3D750BB0951A99
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\Changes.txttext
MD5:C3CDD3198E43F3EC42563E1378FA8522
SHA256:1A79AC86A957F1DCAB9E97148ED9F1B4056505F049AEF58CF5B4058468868825
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\ReadMe.txttext
MD5:1309C8B9CC851D5EE46D106423F25F68
SHA256:4012BA4C95101983F5512F603E9ADEBE16EA9D553C09183A3CD2E4FC70B1963B
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\is-4KL4O.tmptext
MD5:C3CDD3198E43F3EC42563E1378FA8522
SHA256:1A79AC86A957F1DCAB9E97148ED9F1B4056505F049AEF58CF5B4058468868825
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\is-LURLV.tmptext
MD5:1309C8B9CC851D5EE46D106423F25F68
SHA256:4012BA4C95101983F5512F603E9ADEBE16EA9D553C09183A3CD2E4FC70B1963B
3216reshacker_setup.tmpC:\Program Files\Resource Hacker\help\is-OD483.tmpimage
MD5:C22E951D566D4F04C9A05ADA367BEAFE
SHA256:FA524D4222306565FE74B91FAB22377C2A9D021A47A1BA66C11F81B4828956B2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
4
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
Process
Message
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\SciLexer.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\plugins\Config\nppPluginList.dll
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
ED255D9151912E40DF048A56288E969A8D0DAFA3
notepad++.exe
VerifyLibrary: C:\Program Files\Notepad++\updater\gup.exe