File name:

1 (648)

Full analysis: https://app.any.run/tasks/8c38a9e6-9d69-484e-9d81-7decfefbdb5b
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 25, 2025, 01:46:18
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

65D6A88F3DF1A0F037B163E58DAAC650

SHA1:

5BBDA72C493E1A21835E345B28C51081676AB2A7

SHA256:

4B97D093C0855B7CC7E486AD97940032B42CF944DD190BF3B1062F823F45AD88

SSDEEP:

6144:+TCwykeg2XYfVJu5pUhxO34AqOc0DXmKYGeqaFvAeFejTn7Vx2sf0aPP1oggvCR:+gWsUhnNl9VAeFejrj280aX1o5O

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • 517f50ffd1a03.exe (PID: 4424)
    • Modifies files in the Chrome extension folder

      • 517f50ffd1a03.exe (PID: 4424)
    • Actions looks like stealing of personal data

      • 517f50ffd1a03.exe (PID: 4424)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • 1 (648).exe (PID: 6032)
    • Executable content was dropped or overwritten

      • 1 (648).exe (PID: 6032)
      • 517f50ffd1a03.exe (PID: 4424)
    • Creates a software uninstall entry

      • 517f50ffd1a03.exe (PID: 4424)
    • Creates/Modifies COM task schedule object

      • 517f50ffd1a03.exe (PID: 4424)
    • Reads security settings of Internet Explorer

      • 517f50ffd1a03.exe (PID: 4424)
  • INFO

    • Create files in a temporary directory

      • 1 (648).exe (PID: 6032)
      • 517f50ffd1a03.exe (PID: 4424)
    • Checks supported languages

      • 517f50ffd1a03.exe (PID: 4424)
      • 1 (648).exe (PID: 6032)
    • The sample compiled with english language support

      • 1 (648).exe (PID: 6032)
      • 517f50ffd1a03.exe (PID: 4424)
    • Creates files or folders in the user directory

      • 517f50ffd1a03.exe (PID: 4424)
    • Creates files in the program directory

      • 517f50ffd1a03.exe (PID: 4424)
    • Reads the computer name

      • 517f50ffd1a03.exe (PID: 4424)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:11:18 16:27:35+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 104960
InitializedDataSize: 35328
UninitializedDataSize: -
EntryPoint: 0x14b04
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 9.20.0.0
ProductVersionNumber: 9.20.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 9.2
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2010 Igor Pavlov
OriginalFileName: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 9.2
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 1 (648).exe 517f50ffd1a03.exe sppextcomobj.exe no specs slui.exe no specs 1 (648).exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4424.\517f50ffd1a03.exe /sC:\Users\admin\AppData\Local\Temp\7zSBB91.tmp\517f50ffd1a03.exe
1 (648).exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\7zsbb91.tmp\517f50ffd1a03.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4692"C:\Users\admin\AppData\Local\Temp\1 (648).exe" C:\Users\admin\AppData\Local\Temp\1 (648).exeexplorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7z Setup SFX
Exit code:
3221226540
Version:
9.20
Modules
Images
c:\users\admin\appdata\local\temp\1 (648).exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6032"C:\Users\admin\AppData\Local\Temp\1 (648).exe" C:\Users\admin\AppData\Local\Temp\1 (648).exe
explorer.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7z Setup SFX
Exit code:
0
Version:
9.20
Modules
Images
c:\users\admin\appdata\local\temp\1 (648).exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
6112C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7408C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Total events
628
Read events
610
Write events
18
Delete events
0

Modification events

(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Mozilla\Firefox\Extensions
Operation:writeName:qoaym@awg-knmah.co.uk
Value:
C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\qoaym@awg-knmah.co.uk
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00D4ED2C-4732-2790-98AF-042E81A97106}\InProcServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00D4ED2C-4732-2790-98AF-042E81A97106}
Operation:writeName:NoExplorer
Value:
1
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID
Operation:writeName:{00D4ED2C-4732-2790-98AF-042E81A97106}
Value:
1
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{C3F3165C-74D3-6FDB-3274-14FDA8698CFA}
Operation:writeName:DisplayName
Value:
Borowuse2saave
(PID) Process:(4424) 517f50ffd1a03.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{C3F3165C-74D3-6FDB-3274-14FDA8698CFA}
Operation:writeName:DisplayVersion
Value:
Executable files
8
Suspicious files
17
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
60321 (648).exeC:\Users\admin\AppData\Local\Temp\7zSBB91.tmp\qoaym@awg-knmah.co.uk\content\bg.jsbinary
MD5:8F8265BA65B75AF2B4DB1DB6D28AD51D
SHA256:1160326DD97D565C19D1E7FE15347E065C54918B5FF333895389B42F31520418
60321 (648).exeC:\Users\admin\AppData\Local\Temp\7zSBB91.tmp\qoaym@awg-knmah.co.uk\chrome.manifesttext
MD5:F84BA4D1175E402673C79D2BB195A2AD
SHA256:58DCA5120E704A28D9B4D322D0837E8A1F62E08327F7435A1C838EAA2BFEABE3
4424517f50ffd1a03.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\qoaym@awg-knmah.co.uk\bootstrap.jsbinary
MD5:CAEA1CD841FE433BE6820F914D6E3EEA
SHA256:CEBBA189932417733F4334C45936353C11888D75DA227EFD65060C7B1B9A9411
4424517f50ffd1a03.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\qoaym@awg-knmah.co.uk\install.rdfxml
MD5:999EB4E5B95E2F5EDB66B1ECEE1A7D6E
SHA256:2FC662276C2FF87B2F8D006AF4B03FA3EF530D8CADCD059A4DC3EDB8C3444854
4424517f50ffd1a03.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\qoaym@awg-knmah.co.uk\content\bg.jsbinary
MD5:8F8265BA65B75AF2B4DB1DB6D28AD51D
SHA256:1160326DD97D565C19D1E7FE15347E065C54918B5FF333895389B42F31520418
4424517f50ffd1a03.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ahfapfjckkcdfeggcgndpheaopkcclcd\1\517f50ffd181d8.61064679.jsbinary
MD5:79D3DE3E25EA4C87376219F5EF530886
SHA256:F96FA6918E6BB23B6D140ECC0F2A9A50026FD0DA64D84B18B2901DFF3AAAEA87
60321 (648).exeC:\Users\admin\AppData\Local\Temp\7zSBB91.tmp\qoaym@awg-knmah.co.uk\install.rdfxml
MD5:999EB4E5B95E2F5EDB66B1ECEE1A7D6E
SHA256:2FC662276C2FF87B2F8D006AF4B03FA3EF530D8CADCD059A4DC3EDB8C3444854
4424517f50ffd1a03.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\extensions\qoaym@awg-knmah.co.uk\chrome.manifesttext
MD5:F84BA4D1175E402673C79D2BB195A2AD
SHA256:58DCA5120E704A28D9B4D322D0837E8A1F62E08327F7435A1C838EAA2BFEABE3
4424517f50ffd1a03.exeC:\Users\admin\AppData\Local\Temp\nsnBCAC.tmp\UserInfo.dllexecutable
MD5:7579ADE7AE1747A31960A228CE02E666
SHA256:564C80DEC62D76C53497C40094DB360FF8A36E0DC1BDA8383D0F9583138997F5
60321 (648).exeC:\Users\admin\AppData\Local\Temp\7zSBB91.tmp\ahfapfjckkcdfeggcgndpheaopkcclcd\background.htmlhtml
MD5:6F6C229BE6CC8FB520F8AA18D95128D5
SHA256:F6D8CA74BDEE5F837413FB767E0BC2961B23D1212FFB40992CAC8525AF6302BC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
25
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5496
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
8164
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
8164
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
7312
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4
System
192.168.100.255:138
unknown
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5496
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5496
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4
System
192.168.100.255:137
unknown
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6544
svchost.exe
40.126.31.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 40.127.240.158
unknown
google.com
  • 216.58.206.78
unknown
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
unknown
client.wns.windows.com
  • 40.113.103.199
unknown
login.live.com
  • 40.126.31.128
  • 20.190.159.73
  • 40.126.31.0
  • 20.190.159.75
  • 20.190.159.23
  • 20.190.159.131
  • 40.126.31.67
  • 20.190.159.130
unknown
ocsp.digicert.com
  • 184.30.131.245
unknown
arc.msn.com
  • 20.223.35.26
unknown
slscr.update.microsoft.com
  • 4.245.163.56
unknown
www.microsoft.com
  • 184.30.21.171
unknown
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
unknown

Threats

No threats detected
No debug info