File name:

start.exe

Full analysis: https://app.any.run/tasks/fee298db-2505-44e6-968b-8b4094495c14
Verdict: Malicious activity
Analysis date: May 30, 2025, 10:48:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
sfx
dropper
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

AB3847BFF89EB639A99AFECFC2FA05C5

SHA1:

1E018D2911C0FF22908752FB1134945BC6944FA5

SHA256:

5751CEB02DA4FBABA02AC497385AF9A898D964204A11F00F1410A3A0DBB3B06D

SSDEEP:

12288:tcgCzNHJj96xfKJStJkRm3bYXob0AnmFMcaGQx8n54cAAfkIJpDfK:EQKgLIQmFuGQxuAAfkIbjK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SFX dropper has been detected

      • start.exe (PID: 1572)
  • SUSPICIOUS

    • Application launched itself

      • start.exe (PID: 1572)
    • Reads security settings of Internet Explorer

      • start.exe (PID: 1572)
      • donate.exe (PID: 1892)
      • time.exe (PID: 2888)
    • Reads the Internet Settings

      • start.exe (PID: 1572)
      • start.exe (PID: 2656)
      • donate.exe (PID: 1892)
      • cmd.exe (PID: 676)
      • time.exe (PID: 2888)
    • There is functionality for taking screenshot (YARA)

      • start.exe (PID: 1572)
      • start.exe (PID: 2656)
    • Executing commands from a ".bat" file

      • donate.exe (PID: 1892)
      • time.exe (PID: 2888)
      • explorer.exe (PID: 2196)
    • Starts CMD.EXE for commands execution

      • donate.exe (PID: 1892)
      • time.exe (PID: 2888)
      • explorer.exe (PID: 2196)
    • Uses TASKKILL.EXE to kill process

      • joke.exe (PID: 1632)
    • Uses REG/REGEDIT.EXE to modify registry

      • joke.exe (PID: 1632)
    • The executable file from the user directory is run by the CMD process

      • s.exe (PID: 3976)
    • The process executes JS scripts

      • cmd.exe (PID: 3304)
    • Executable content was dropped or overwritten

      • cscript.exe (PID: 2772)
  • INFO

    • Checks supported languages

      • start.exe (PID: 1572)
      • start.exe (PID: 2656)
      • donate.exe (PID: 1892)
      • time.exe (PID: 2888)
    • Reads the computer name

      • start.exe (PID: 1572)
      • start.exe (PID: 2656)
      • donate.exe (PID: 1892)
      • time.exe (PID: 2888)
    • Creates files in the program directory

      • start.exe (PID: 2656)
    • Manual execution by a user

      • WinRAR.exe (PID: 2960)
      • taskmgr.exe (PID: 2416)
      • donate.exe (PID: 1892)
      • time.exe (PID: 2780)
      • time.exe (PID: 2888)
      • joke.exe (PID: 4048)
      • joke.exe (PID: 1632)
    • Create files in a temporary directory

      • donate.exe (PID: 1892)
      • time.exe (PID: 2888)
    • Application launched itself

      • chrome.exe (PID: 1848)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:03 07:51:19+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.33
CodeSize: 214528
InitializedDataSize: 188928
UninitializedDataSize: -
EntryPoint: 0x21d50
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
82
Monitored processes
29
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #DROPPER start.exe no specs start.exe winrar.exe no specs taskmgr.exe no specs donate.exe no specs cmd.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs time.exe no specs time.exe chrome.exe no specs chrome.exe no specs cmd.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs joke.exe no specs joke.exe taskkill.exe no specs taskkill.exe no specs reg.exe no specs explorer.exe no specs taskmgr.exe no specs cmd.exe no specs cscript.exe s.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
676"C:\Windows\system32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\E74E.tmp\E74F.tmp\E750.bat C:\Users\admin\Desktop\donate.exe"C:\Windows\System32\cmd.exedonate.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1548"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Task Manager
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1572"C:\Users\admin\Desktop\start.exe" C:\Users\admin\Desktop\start.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\start.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1632"C:\Users\admin\Desktop\joke.exe" C:\Users\admin\Desktop\joke.exe
explorer.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
Virus
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\joke.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1848"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.donationalerts.com/r/Reyz0L"C:\Program Files\Google\Chrome\Application\chrome.exe
cmd.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1892"C:\Users\admin\Desktop\donate.exe" C:\Users\admin\Desktop\donate.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\donate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
2196explorer.exeC:\Windows\explorer.exejoke.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2416"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2580REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /fC:\Windows\System32\reg.exejoke.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2804 --field-trial-handle=1164,i,2602935251816353573,14682431328285503331,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
19 744
Read events
19 538
Write events
204
Delete events
2

Modification events

(PID) Process:(1572) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1572) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1572) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1572) start.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2960) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(2960) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
Executable files
1
Suspicious files
20
Text files
25
Unknown types
0

Dropped files

PID
Process
Filename
Type
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF19016d.TMP
MD5:
SHA256:
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
2960WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2960.023\OIETIF.battext
MD5:C2852FB55116AC0B829DF7E9C0E3E04B
SHA256:4540A0AF78874DACE7BF6D3C69E6E6E033D3CD65BE718BC1516A687916433662
1892donate.exeC:\Users\admin\AppData\Local\Temp\E74E.tmp\E74F.tmp\E750.battext
MD5:45D022431CB16738A2CC3E942AFD5588
SHA256:AEEF76E749F86EDF2BFCB60A263AD3613339FC06750BC0060ABB69568B923725
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.oldtext
MD5:C6F15CDB9302BD52235CBDDBA2789C07
SHA256:99936CD5D4D75C455329F217F8B276A697BDCCC05664615E20BAB45D4638D8AF
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF19011f.TMPtext
MD5:825B582C78EC88D54C215EFDF1EAD639
SHA256:367995D01A8F13E5C30C79499F86B034775BFD009D83DC97635DE438D47DFA37
2888time.exeC:\Users\admin\AppData\Local\Temp\584.tmp\585.tmp\586.battext
MD5:181E3F0910F3AC9DC91CA7DF0163880B
SHA256:3BEB355F33A085B3DA5BD6D8B5018A2498EE44869082137BA0C0784F1B47DF33
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old~RF19064f.TMPtext
MD5:98CC34E7F20FD8F55568DB9B3D3B507E
SHA256:8D3D74EC41FF0CCE1F26B23F66E5981B7F59C40AB0DBB468B3A3E5E63C80F3C7
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.old~RF19066e.TMPtext
MD5:23E954DCE0FB0ECF46A96FF4ACBE66F4
SHA256:68F3B7AA8367C46273C296103B799A112DE3B70DE873C16F7166496CA31C3DDD
1848chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.oldtext
MD5:5CB0B2845A3BDF2304E7CEA61A3FC51E
SHA256:0A73277FE3C683BCACFCF2658568C9D750AB78F56A4DEA9FBD563AA5D67EC666
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
20
DNS requests
15
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
3012
chrome.exe
142.250.185.131:443
clientservices.googleapis.com
GOOGLE
US
whitelisted
1848
chrome.exe
239.255.255.250:1900
whitelisted
3012
chrome.exe
92.38.244.24:443
www.donationalerts.com
LLC Digital Network
RU
unknown
3012
chrome.exe
74.125.71.84:443
accounts.google.com
GOOGLE
US
whitelisted
3012
chrome.exe
142.250.186.132:443
www.google.com
GOOGLE
US
whitelisted
1848
chrome.exe
224.0.0.251:5353
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
clientservices.googleapis.com
  • 142.250.185.131
whitelisted
www.donationalerts.com
  • 92.38.244.24
unknown
accounts.google.com
  • 74.125.71.84
whitelisted
www.google.com
  • 142.250.186.132
whitelisted
update.googleapis.com
  • 142.250.184.195
whitelisted
optimizationguide-pa.googleapis.com
  • 142.250.185.202
  • 142.250.186.106
  • 142.250.185.74
  • 142.250.186.138
  • 142.250.181.234
  • 172.217.23.106
  • 142.250.185.138
  • 142.250.185.170
  • 216.58.206.42
  • 142.250.186.74
  • 142.250.74.202
  • 216.58.212.170
  • 142.250.186.42
  • 142.250.185.234
  • 172.217.16.202
  • 142.250.185.106
whitelisted
www.googleapis.com
  • 172.217.18.10
  • 142.250.185.202
  • 142.250.184.234
  • 142.250.185.170
  • 142.250.185.106
  • 172.217.18.106
  • 142.250.181.234
  • 142.250.184.202
  • 142.250.185.74
  • 142.250.186.106
  • 142.250.186.138
  • 142.250.185.234
  • 142.250.186.170
  • 142.250.185.138
  • 172.217.23.106
  • 216.58.206.74
whitelisted

Threats

No threats detected
No debug info