File name:

MrsMajor 3.0.exe

Full analysis: https://app.any.run/tasks/9335d590-bf7e-45c3-93f0-7d08d0b2097b
Verdict: Malicious activity
Analysis date: April 25, 2025, 19:26:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

35A27D088CD5BE278629FAE37D464182

SHA1:

D5A291FADEAD1F2A0CF35082012FE6F4BF22A3AB

SHA256:

4A75F2DB1DBD3C1218BB9994B7E1C690C4EDD4E0C1A675DE8D2A127611173E69

SSDEEP:

6144:Th3idhONY259BH1DzJ5PzVNtGgc+F9TBd096cTKAsLEbqqbd+VWM8AHiKn9SlXNA:Th3iXPw9Tc6kVXMHHLEf8l7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Creates a new registry key or changes the value of an existing one (SCRIPT)

      • wscript.exe (PID: 1196)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • MrsMajor 3.0.exe (PID: 5324)
      • eulascr.exe (PID: 7212)
    • Reads security settings of Internet Explorer

      • MrsMajor 3.0.exe (PID: 5324)
    • Reads the date of Windows installation

      • MrsMajor 3.0.exe (PID: 5324)
    • Runs WScript without displaying logo

      • wscript.exe (PID: 1196)
    • The process executes VB scripts

      • MrsMajor 3.0.exe (PID: 5324)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 1196)
  • INFO

    • The sample compiled with english language support

      • MrsMajor 3.0.exe (PID: 5324)
    • Reads the computer name

      • MrsMajor 3.0.exe (PID: 5324)
      • eulascr.exe (PID: 7212)
    • Create files in a temporary directory

      • MrsMajor 3.0.exe (PID: 5324)
      • eulascr.exe (PID: 7212)
    • Process checks computer location settings

      • MrsMajor 3.0.exe (PID: 5324)
    • Checks supported languages

      • MrsMajor 3.0.exe (PID: 5324)
      • eulascr.exe (PID: 7212)
    • Reads the machine GUID from the registry

      • eulascr.exe (PID: 7212)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.2)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2018:02:01 20:47:38+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware
PEType: PE32+
LinkerVersion: 2.5
CodeSize: 86528
InitializedDataSize: 303104
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 3.0.0.0
ProductVersionNumber: 3.0.0.0
FileFlagsMask: 0x003f
FileFlags: Debug, Pre-release, Private build
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileVersion: 3.0.0.0
ProductVersion: 3.0.0.0
ProductName: MrsMajor
OriginalFileName: MrsMajor3.0.exe
InternalName: MrsMajor3.0
FileDescription: Watch out
CompanyName: Mnc 2020
LegalCopyright: Elektro Berkay / MoonCon / Tobiaddr0c
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start mrsmajor 3.0.exe wscript.exe no specs eulascr.exe sppextcomobj.exe no specs slui.exe no specs mrsmajor 3.0.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1196"C:\WINDOWS\system32\wscript.exe" C:\Users\admin\AppData\Local\Temp\B836.tmp\B837.tmp\B838.vbs //Nologo C:\Windows\System32\wscript.exeMrsMajor 3.0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5072"C:\Users\admin\AppData\Local\Temp\MrsMajor 3.0.exe" C:\Users\admin\AppData\Local\Temp\MrsMajor 3.0.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\mrsmajor 3.0.exe
c:\windows\system32\ntdll.dll
5324"C:\Users\admin\AppData\Local\Temp\MrsMajor 3.0.exe" C:\Users\admin\AppData\Local\Temp\MrsMajor 3.0.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\mrsmajor 3.0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7212"C:\Users\admin\AppData\Local\Temp\B836.tmp\eulascr.exe" C:\Users\admin\AppData\Local\Temp\B836.tmp\eulascr.exe
wscript.exe
User:
admin
Integrity Level:
HIGH
Description:
mmdropper
Version:
1.0.7321.42228
Modules
Images
c:\users\admin\appdata\local\temp\b836.tmp\eulascr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7412C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7444"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
1 901
Read events
1 900
Write events
1
Delete events
0

Modification events

(PID) Process:(1196) wscript.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Operation:writeName:ConsentPromptBehaviorAdmin
Value:
0
Executable files
3
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
5324MrsMajor 3.0.exeC:\Users\admin\AppData\Local\Temp\B836.tmp\eulascr.exeexecutable
MD5:8B1C352450E480D9320FCE5E6F2C8713
SHA256:2C343174231B55E463CA044D19D47BD5842793C15954583EB340BFD95628516E
5324MrsMajor 3.0.exeC:\Users\admin\AppData\Local\Temp\B836.tmp\AgileDotNet.VMRuntime.dllexecutable
MD5:266373FADD81120BAEAE3504E1654A5A
SHA256:0798779DC944BA73C5A9CE4B8781D79F5DD7B5F49E4E8EF75020DE665BAD8CCB
5324MrsMajor 3.0.exeC:\Users\admin\AppData\Local\Temp\B836.tmp\B837.tmp\B838.vbsbinary
MD5:3B8696ECBB737AAD2A763C4EAF62C247
SHA256:CE95F7EEA8B303BC23CFD6E41748AD4E7B5E0F0F1D3BDF390EADB1E354915569
7212eulascr.exeC:\Users\admin\AppData\Local\Temp\5a530dfd-bc51-4992-a05d-f09d41a331d4\AgileDotNetRT64.dllexecutable
MD5:42B2C266E49A3ACD346B91E3B0E638C0
SHA256:ADEED015F06EFA363D504A18ACB671B1DB4B20B23664A55C9BC28AEF3283CA29
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
13
DNS requests
8
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
4996
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.76
  • 40.126.32.134
  • 20.190.160.132
  • 20.190.160.4
  • 20.190.160.130
  • 40.126.32.72
  • 40.126.32.68
  • 20.190.160.131
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted

Threats

No threats detected
No debug info